Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 15:33
Static task
static1
Behavioral task
behavioral1
Sample
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe
Resource
win7-20231129-en
General
-
Target
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe
-
Size
4.5MB
-
MD5
edc9881fb8cb97d661a7eacd1e354772
-
SHA1
69c52fac385b6a5022c91ff6f1b43ffa05fc1dbe
-
SHA256
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18
-
SHA512
73040495547beae4b62078d71642a53b4fb198fdf63511f00d76602e830d4be1248eec93872a5ec3a24e22b0e375c95fc98346c7aa01cfbf31cd1aaa8223d61d
-
SSDEEP
98304:TcLUHGONrwxm2lvozNrxzsW8iJdR2S0wJWSSBOi8zG8b7qlfMJg:TcLUmOxHegzNCW8iJXg587b7qBOg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe -
Executes dropped EXE 2 IoCs
Processes:
xplorer2_setup64_ult.exeLicense.exepid process 2324 xplorer2_setup64_ult.exe 5736 License.exe -
Loads dropped DLL 4 IoCs
Processes:
xplorer2_setup64_ult.exepid process 2324 xplorer2_setup64_ult.exe 2324 xplorer2_setup64_ult.exe 2324 xplorer2_setup64_ult.exe 2324 xplorer2_setup64_ult.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
xplorer2_setup64_ult.exedescription ioc process File created C:\Program Files\zabkat\xplorer2_ult\snap2\desktop.ini xplorer2_setup64_ult.exe -
Drops file in Program Files directory 64 IoCs
Processes:
xplorer2_setup64_ult.exeLicense.exedescription ioc process File created C:\Program Files\zabkat\xplorer2_ult\snap2\15-details.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\23-progress.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\45-msdos.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\box_bs.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\rightdrag.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\37-stats.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\adstag.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\bulkattr.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\miniopt.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\recorder.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\uncida.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\20a-editcc.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\5-cmdfinder.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\52-custool.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\error.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\filtermenu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\titlebar.gif xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\X2.LIC License.exe File opened for modification C:\Program Files\zabkat\xplorer2_ult\editor2_64.exe.manifest xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\sendto.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\warn.gif xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\registry.txt xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\x2skin_48.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\48-macro.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\path1.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\changes.txt xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\31-comments.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\stats-menu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\tagmenu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\add2index.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\commentsd.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\delprogr.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\info.gif xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\renmode.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\ed2skin_XL.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\lay-thumb.jpg xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\scrap-context.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\scrap-header.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\x2args.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\licerr.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\12-cgroup.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\opt-adv.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\optserts.png xplorer2_setup64_ult.exe File opened for modification C:\Program Files\zabkat\xplorer2_ult\msimg32.dll License.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\addressbar.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\mini-search.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\zabkat_grligo.png xplorer2_setup64_ult.exe File opened for modification C:\Program Files\zabkat\xplorer2_ult\X2.LIC License.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\39-duplex.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\54-advopt.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\export2.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\lay-default.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\opendlg.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\sendtoscrap.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\undo.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\3264.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\datefmt.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\dlghelp.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\51-accel.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\qvmenu.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\11-columns.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\40-simpix.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\cpoptions.png xplorer2_setup64_ult.exe File created C:\Program Files\zabkat\xplorer2_ult\snap2\grp2dir.png xplorer2_setup64_ult.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 33 IoCs
Processes:
xplorer2_setup64_ult.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell\open xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\ = "[ViewFolder_X2(\"%L\", %I)]" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\ddeexec\application xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\DefaultIcon xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\command\ = "\"C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe\" /M /E \"%1\"" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\application\ = "Folders_X2" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\DefaultIcon xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ColumnHandlers\ xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell\open\command xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.x2fnd xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\DefaultIcon\ = "C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe,-360" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\command xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.x2fnd\ = "xpl2.Search" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell\open\command\ = "\"C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe\" /F:1 /M \"/L:%1\"" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cida xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell\open xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell\open\command\ = "\"C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe\" /F:1 /M \"%1\"" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\DefaultIcon\ = "C:\\Program Files\\zabkat\\xplorer2_ult\\xplorer2_64.exe,-270" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\shell xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\x2scrap.Document\ = "xplorer² scrap document" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\shell\open\command xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\xpl2.Search\ = "xplorer² saved search" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\topic\ = "AppProperties" xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cida\ = "x2scrap.Document" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ColumnHandlers xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2 xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ = "Open with xplorer²" xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\ddeexec xplorer2_setup64_ult.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shell\open_x2\ddeexec\NoActivateHandler xplorer2_setup64_ult.exe Key created \REGISTRY\MACHINE\Software\Classes\Folder\shell\open_x2\ddeexec\topic xplorer2_setup64_ult.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
msedge.exemsedge.exeidentity_helper.exemsedge.exepid process 4068 msedge.exe 4068 msedge.exe 5200 msedge.exe 5200 msedge.exe 2044 identity_helper.exe 2044 identity_helper.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe 4556 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
Processes:
msedge.exepid process 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
Processes:
msedge.exepid process 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe 5200 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
xplorer2_setup64_ult.exepid process 2324 xplorer2_setup64_ult.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exemsedge.exedescription pid process target process PID 4084 wrote to memory of 2324 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 4084 wrote to memory of 2324 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 4084 wrote to memory of 2324 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe xplorer2_setup64_ult.exe PID 4084 wrote to memory of 5736 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe License.exe PID 4084 wrote to memory of 5736 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe License.exe PID 4084 wrote to memory of 5200 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe msedge.exe PID 4084 wrote to memory of 5200 4084 321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe msedge.exe PID 5200 wrote to memory of 3692 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 3692 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 2148 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 4068 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 4068 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe PID 5200 wrote to memory of 896 5200 msedge.exe msedge.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe"C:\Users\Admin\AppData\Local\Temp\321c221f6886487af722f5130018f7d4e259e1ce1f4c5ba1e1b820fbc8cecd18.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exe" /S2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:5736 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.cybermania.ws/2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5200 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2224 /prefetch:23⤵PID:2148
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:4068 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2676 /prefetch:83⤵PID:896
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:13⤵PID:5748
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵PID:2464
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:13⤵PID:3172
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5140 /prefetch:13⤵PID:6140
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:83⤵PID:2800
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5744 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:2044 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4156 /prefetch:13⤵PID:4728
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5772 /prefetch:13⤵PID:3048
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5408 /prefetch:13⤵PID:5780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6200 /prefetch:13⤵PID:620
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,9695337798439683604,5950452349046221204,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=3792 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:4556
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe7dcb46f8,0x7ffe7dcb4708,0x7ffe7dcb47181⤵PID:3692
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1168
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\zabkat\xplorer2_ult\xplorer2_64.exeFilesize
670KB
MD56d720e9be10f7b2342c10ce349c3cee5
SHA1413f080c9fcb708dd6a60a599b1ea9337ddcc40a
SHA2560206428a7a4c609cb3db5f293975b087b2c305433b248dcbcab6761841f57187
SHA512a36f13d36b51f077fcaa8e2c39a5ece3b6c1e4756913b4c47ab82946ac663a253a8b132427007f582edfbf1df46cd0b61a39dc28db45a29944aa2efbc3967151
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506Filesize
330B
MD50c7ef59afdbbc7cc0dc3e70c4eca9b69
SHA1b3d035b90560c0e5ec12729da4b2a76df44f9cc1
SHA2565839a2f606e940647c583cf02c85e79342d111931ce88741bcef187046efb6e0
SHA512f647303c4828f6da298575c44c6c6eae6dddb3006a3a9145aa2df1afaae5ccbd4e77cd821868dd38895db64740d17ec1beeb347a6ccc9b4b91a181cd15aa9153
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datFilesize
152B
MD51386433ecc349475d39fb1e4f9e149a0
SHA1f04f71ac77cb30f1d04fd16d42852322a8b2680f
SHA256a7c79320a37d3516823f533e0ca73ed54fc4cdade9999b9827d06ea9f8916bbc
SHA512fcd5449c58ead25955d01739929c42ffc89b9007bc2c8779c05271f2d053be66e05414c410738c35572ef31811aff908e7fe3dd7a9cef33c27acb308a420280e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-indexFilesize
432B
MD5f9e2604f6b6a13125130a4494dc4a529
SHA1d58b28d9b1ce92054333c2e079f27206adedccda
SHA256b17785f62aed9396b1bfe13612b796268e57329906fecea11b9c094cc93965c5
SHA512fec80186a752877f3e8463c33ab04488c6a89ec0202f8fb68b12c4ee374196e208907d99bad2f16df0bff9007c811ac5503a9de60d80a9ee345c7c0730f0ca1a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent StateFilesize
2KB
MD5c74e0057b3cb79a7f0a8f829d35862ce
SHA1736a0b5c995b4a75cbaf7eb008af95256f16c6b2
SHA256a33e4fdc04f4d9884959340b7f6fb9cc73120fb733936a6d22404c818063f079
SHA512f1de15a389cfaccd5ed743137e45139b0237441085b902243654e8fd22dac3bb52c819cff05813ec98566aa232802a9ddd740e4b684f53d8f597100cdf595ccb
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
6KB
MD50cebb7d305f7e9c12879be1f96a214cf
SHA1b768a4bc33d3cdac1ad965e3407c7d3824fd651f
SHA256279f4dc599e77e7e5436b831188899e70765c4cf7f3c10733ed398a364c95470
SHA51227b538c220e51e1f9dd7b4d605a7fc926442621aa34050bd7aca4936b896668b4a8657b35ab642817ee217316b6aa7c66d44d99611aed4838456c4c0b8756733
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\PreferencesFilesize
5KB
MD5f2002f442a3b27747bae836ea9ec768c
SHA13d68514f25014bb1e3f7c7656dfcf992ac0b6cab
SHA2566382e0b520d296ed28176596f417008149c3b02f7439bb7f32e68c407cb9c794
SHA5120d912eeab4feb0765fbf13f77b5489b1dfc3b5e0ca5034d6f7e14c2ea83983c13de0756f78798a51518797b3263d79a1db96cd9fc7e0577ce24419e4dc773a82
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Secure PreferencesFilesize
24KB
MD5e664066e3aa135f185ed1c194b9fa1f8
SHA1358ff3c6ad0580b8ae1e5ef2a89a4e597c2efdc5
SHA25686e595be48dbc768a52d7ea62116036c024093e1302aced8c29dd6a2d9935617
SHA51258710818b5f664006a5aa418da6c8cd3f709c2265bc161f81b9dfe6cdb8304fabaa4ce9deba419fe4281623feeeaa0321f481ae5855d347c6d8cf95968ee905e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENTFilesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local StateFilesize
10KB
MD55a359c765b9677b360627bf896e71ba9
SHA1eeb033c597b3da40460c052c7e319d82444829ad
SHA256a39cfefb3bd85a8baf34fff3524127443fe14a8a290f0c9a1ada5892e199e7a1
SHA5120494e685671ccbf9e5e6022c11eb139a5a1a3baba30a975d65ace706ec74dc39aeb34cf34ff6c75db700587f035705cda05c88e438a39586a90c9b805fe3fd93
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\CyberMania.urlFilesize
4KB
MD5f89e823b83f9edc863ae9e35ea0a5949
SHA112db7e3d70e47bd97df335c74cd7323dc48a778d
SHA2567fba1e8849a88298272be247c2b22ef4a50ac1bc4c83a4c02848bc131e622088
SHA512d3e297af4eeeb3b8201381fddc426c33ab543db80c0da2ef7ee000ad773cf6895d7221ec17b95806377ea74488f8db7354e23d13c43d87599f6b02631e379d35
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\License.exeFilesize
485KB
MD5f87ace7db22a97590b798a3e7ad12c5d
SHA10c15f371357fbfe8013c2cbe863359633efb5710
SHA256e9470864b10746943b4a1d77c88a98a21e646db7144b5b0f894873414e8fe55c
SHA5122875eafa1dec2662bc55ad0268c4f32282db106eeba8f8f70c261afc62fe3c6ec2ccbf32e27bd1a4d98769d62599ad76632abf3af8f9db6a5f0eaed3acf1a852
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exeFilesize
970KB
MD5e4b0fc4f97e3fe17c7ac3fed8e1e0edc
SHA1729eb709cabb47a25aa76e2c875f692bf217077c
SHA2567b4ef1ced5af1eecb5b6560883f8cc1ee8083c13a673cf6092b43e68de7fcb8f
SHA51284edf3fe95b556cb5ff18ad63be85d1450304c7d1ab1749ba0dbdc6a7e00c794b5a08fe3760004c764e7150f41b466947af6fddc3e302fab7b5b6c33b0af932b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exeFilesize
408KB
MD553873c2161f6ec6f84752737896b50c4
SHA13a27f7c042d1f6392ec454211157dee570a886de
SHA256aea7fc51379ebc8f2e987ed956cf36695a449a39392fc4b7bc9d5d25d329d43d
SHA512b78fe827245499235324ccd90978b1164825a2acf4ef83888778790c273acf0f42cce6687b5ee4387eae0894e2b462d3a39f3c638bcc386bbe216af010b8e62b
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\xplorer2_setup64_ult.exeFilesize
298KB
MD55aa3a2d21fa507da06c646f83faae937
SHA1edacf50fb936eab3cb86e577e870d349947c87d8
SHA256382954e0c0758b2f29768a5d44215a7a15e582dc258595bc35b286580074d480
SHA512e52d827d561d9cf851e9e833f00d3391dd153f43d4e41541ff077a179dffddba94004d4c7be4416c7043d0d943da96297dca1598c15c02ef43f7338cc4ecf5b4
-
C:\Users\Admin\AppData\Local\Temp\nso5064.tmp\InstallOptions.dllFilesize
15KB
MD50a9fb96a7579b685ec36b17fc354e6a3
SHA1355754104dd47d5fcf8918dee0dc2e2ee53390a6
SHA256b34fb342f21d690aac024b6f48a597e78d15791ef480ac55159cd585d0f64af7
SHA51267870206fa7f1e7df45c8c1bc2f51fb430f0a048a2bdb55a4a41525388ca3b50203784537f139169705a03db4bb13b591162a79a5d2df81a4d11fd849615c86b
-
C:\Users\Admin\AppData\Local\Temp\nso5064.tmp\System.dllFilesize
12KB
MD5564bb0373067e1785cba7e4c24aab4bf
SHA17c9416a01d821b10b2eef97b80899d24014d6fc1
SHA2567a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5
SHA51222c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472
-
C:\Users\Admin\AppData\Local\Temp\nso5064.tmp\UserInfo.dllFilesize
4KB
MD598ff85b635d9114a9f6a0cd7b9b649d0
SHA17a51b13aa86a445a2161fa1a567cdaecaa5c97c4
SHA256933f93a30ce44df96cbc4ac0b56a8b02ee01da27e4ea665d1d846357a8fca8de
SHA512562342532c437236d56054278d27195e5f8c7e59911fc006964149fc0420b1f9963d72a71ebf1cd3dfee42d991a4049a382f7e669863504c16f0fe7097a07a0a
-
C:\Users\Admin\AppData\Local\Temp\nso5064.tmp\x2.iniFilesize
3KB
MD5dcb49302dc7f091a672798d262ffc1ff
SHA13d1c00355392482066e844ca07742890245e644b
SHA256265528bb583808d162e30c9dfc424ce2cc77faf8a51b112205c3f796de11ca3b
SHA5120e57f07b1a4302c28e953c2a3b268b6e3732dc8cd87ce473ec0ebc363c6399a05def65fa2ce0ad84672546bc47202d195314d268c9e090a0c4a91919ba226a58
-
\??\pipe\LOCAL\crashpad_5200_AFDNZJTWBBCRNFVZMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e