Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
03/02/2024, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
ggpermV3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ggpermV3.exe
Resource
win10v2004-20231215-en
General
-
Target
ggpermV3.exe
-
Size
62KB
-
MD5
eac37455baace3357722d2bc5cf40be9
-
SHA1
bfbb2b0f876a0784e5a0d78b7981b27254c0a766
-
SHA256
e333b29fa06d2138c9a4c634fde1fe4212bd2a027c0175008001c8af60d34053
-
SHA512
78065623e0bafa450e49c91b700da3a31536033d005a6d20126cc886bc1075788a4e5d5f7b689b47c4eea01f58f797e696f06038dd967b6143d07204048ad067
-
SSDEEP
1536:eh4f8xsBb7KAMFYieXfRc/onjx6FXs+ceAP5w:bBbnRJfROqwFcZbP5w
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 35 discord.com 36 discord.com 37 discord.com -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SearchProtocolHost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2216 2372 WerFault.exe 1 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000801317ceae56da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\miguiresource.dll,-202 = "Schedule computer tasks to run automatically." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-113 = "Windows PowerShell Integrated Scripting Environment. Performs object-based (command-line) functions" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%CommonProgramFiles%\Microsoft Shared\Ink\ShapeCollector.exe,-299 = "Provide writing samples to help improve the recognition of your handwriting." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-101 = "Chrysanthemum" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\XpsRchVw.exe,-102 = "XPS Viewer" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@"%systemroot%\system32\windowspowershell\v1.0\powershell.exe",-111 = "Performs object-based (command-line) functions" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\iscsicpl.dll,-5001 = "iSCSI Initiator" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%CommonProgramFiles%\Microsoft Shared\Ink\TipTsf.dll,-60 = "Enter text by using handwriting or a touch keyboard instead of a standard keyboard. You can use the writing pad or the character pad to convert your handwriting into typed text or the touch keyboard to enter characters." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\xpsrchvw.exe,-106 = "XPS Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\odbcint.dll,-1310 = "Data Sources (ODBC)" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%SystemRoot%\system32\SNTSearch.dll,-504 = "Create short handwritten or text notes." SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10060 = "Solitaire" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10057 = "Minesweeper" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{45670FA8-ED97-4F44-BC93-305082590BFB} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000206a73d5ae56da01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E37A73F8-FB01-43DC-914E-AAEE76095AB9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000808b38daae56da01 SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\recdisc.exe,-2001 = "Creates a disc you can use to access system recovery options." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\pmcsnap.dll,-710 = "Manages local printers and remote print servers." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10209 = "More Games from Microsoft" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10056 = "Hearts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10056 = "Hearts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200017 = "GobiernoUSA.gov" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%ProgramFiles%\Windows Sidebar\sidebar.exe,-1012 = "Add Desktop Gadgets that display personalized slideshows, news feeds, and other customized information." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\Speech\SpeechUX\sapi.cpl,-5555 = "Windows Speech Recognition" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10059 = "Mahjong Titans" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\mycomput.dll,-300 = "Computer Management" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-308 = "Landscapes" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10057 = "Minesweeper" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SoundRecorder.exe,-100 = "Sound Recorder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\MCTRes.dll,-200016 = "USA.gov" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\filemgmt.dll,-2204 = "Services" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\displayswitch.exe,-320 = "Connect to a Projector" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%windir%\system32\msra.exe,-635 = "Invite a friend or technical support person to connect to your computer and help you, or offer to help someone else." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10103 = "Internet Spades" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10209 = "More Games from Microsoft" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\eHome\ehepgres.dll,-304 = "Public Recorded TV" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\setupapi.dll,-2000 = "Setup Information" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\FXSRESM.dll,-114 = "Windows Fax and Scan" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10101 = "Internet Checkers" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a081bed4ae56da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\gameux.dll,-10082 = "Games Explorer" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@%systemroot%\system32\dfrgui.exe,-172 = "Defragments your disks so that your computer runs faster and more efficiently." SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-118 = "Sleep Away" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\System32\searchfolder.dll,-9023 = "Saved Search" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@gameux.dll,-10055 = "FreeCell" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\SampleRes.dll,-142 = "Wildlife" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\wucltux.dll,-1 = "Windows Update" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\@C:\Windows\system32\wdc.dll,-10021 = "Performance Monitor" SearchProtocolHost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1436 chrome.exe 1436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeManageVolumePrivilege 2456 SearchIndexer.exe Token: 33 2456 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 2456 SearchIndexer.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe Token: SeShutdownPrivilege 1436 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe 1436 chrome.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
pid Process 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2352 SearchProtocolHost.exe 2352 SearchProtocolHost.exe 2352 SearchProtocolHost.exe 2352 SearchProtocolHost.exe 2352 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe 2752 SearchProtocolHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2216 2372 ggpermV3.exe 28 PID 2372 wrote to memory of 2216 2372 ggpermV3.exe 28 PID 2372 wrote to memory of 2216 2372 ggpermV3.exe 28 PID 2372 wrote to memory of 2216 2372 ggpermV3.exe 28 PID 2456 wrote to memory of 2752 2456 SearchIndexer.exe 33 PID 2456 wrote to memory of 2752 2456 SearchIndexer.exe 33 PID 2456 wrote to memory of 2752 2456 SearchIndexer.exe 33 PID 2456 wrote to memory of 2784 2456 SearchIndexer.exe 34 PID 2456 wrote to memory of 2784 2456 SearchIndexer.exe 34 PID 2456 wrote to memory of 2784 2456 SearchIndexer.exe 34 PID 2456 wrote to memory of 2352 2456 SearchIndexer.exe 35 PID 2456 wrote to memory of 2352 2456 SearchIndexer.exe 35 PID 2456 wrote to memory of 2352 2456 SearchIndexer.exe 35 PID 1436 wrote to memory of 1860 1436 chrome.exe 39 PID 1436 wrote to memory of 1860 1436 chrome.exe 39 PID 1436 wrote to memory of 1860 1436 chrome.exe 39 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 1900 1436 chrome.exe 41 PID 1436 wrote to memory of 872 1436 chrome.exe 43 PID 1436 wrote to memory of 872 1436 chrome.exe 43 PID 1436 wrote to memory of 872 1436 chrome.exe 43 PID 1436 wrote to memory of 1136 1436 chrome.exe 42 PID 1436 wrote to memory of 1136 1436 chrome.exe 42 PID 1436 wrote to memory of 1136 1436 chrome.exe 42 PID 1436 wrote to memory of 1136 1436 chrome.exe 42 PID 1436 wrote to memory of 1136 1436 chrome.exe 42 PID 1436 wrote to memory of 1136 1436 chrome.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\ggpermV3.exe"C:\Users\Admin\AppData\Local\Temp\ggpermV3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 6682⤵
- Program crash
PID:2216
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2740
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2752
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 5162⤵
- Modifies data under HKEY_USERS
PID:2784
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3470981204-343661084-3367201002-10002 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵
- Suspicious use of SetWindowsHookEx
PID:2352
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 508 512 520 65536 5162⤵PID:2100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef1a79758,0x7fef1a79768,0x7fef1a797782⤵PID:1860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1168 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:22⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1564 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:1136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:872
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2268 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:12⤵PID:2464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2140 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:12⤵PID:2584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1304 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:22⤵PID:2744
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2440 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:12⤵PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3568 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3552 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:1928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3720 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --mojo-platform-channel-handle=2000 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:12⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=2436 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:2096
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2724 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:82⤵PID:1844
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --mojo-platform-channel-handle=2724 --field-trial-handle=1292,i,17460278292854244424,2355179376169254332,131072 /prefetch:12⤵PID:756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1024KB
MD5e301292b79c0a03de647eea2350b68ce
SHA1eefb064cf5e6a3b05b32fe308f681a5d504ebcaf
SHA256d80b83dbe79107849a30c6140885c095592ecde7e48a4140d44fc20930ba489f
SHA512a1b574c0f87c96aa1b13366fcbe049564b57569f7a090d632538f02235ade13923e048c0de14ee756d14093504f21145da5855e310b9ac7dafae06897b3e37db
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD549ec491a268cc4c5d0ddbb48ce2f1569
SHA1feb1f4835978d6fb3642e94f44cb45cea5fada49
SHA256d84842781e2ae3f4eda75f22b43655b68ce69e589fba398d4230b178c71acdd0
SHA512fcd7a6309e714837fdd292acbfda09c7abe147e25b0433819848ca13ff9d29a467e07a839e34228e954ef7a006377c698d42f54ced82a46ef24f78041f91797f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5c8b6f0706df4f0628c664c2226499a35
SHA176fe3867475f01bd4bd25908e8f8820125be3a39
SHA256e4da9d937413cefbbf0741e4e6eacc23bbc1dc97424a24ce63e8c4116e2e217f
SHA5123e1dd46ac57560fe936bbcb55b0c52acf9e92f8ba9eabc42a8a1f6665c3431f34d846a403340e92a17e4ec1e9e59fcb35257119e17dff209d449175176c4e80a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5d2555d184bc86645bd5ac60a9b56da9c
SHA102d8f74c7e76cb148160ee05717e26b4df6421ca
SHA25607b5ee1fa9a9825afe2279c77d7e55e839a725388d08be0d22eb63405a7a8164
SHA512eb6ea372d86f956fcf61fe97b786d36a85679140274b558a2476d6fae5777006c82877b777e8cb2dd427af5ac68af71e9b893adaeb18ec692bba85ff677e8984
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
111B
MD5285252a2f6327d41eab203dc2f402c67
SHA1acedb7ba5fbc3ce914a8bf386a6f72ca7baa33c6
SHA2565dfc321417fc31359f23320ea68014ebfd793c5bbed55f77dab4180bbd4a2026
SHA51211ce7cb484fee66894e63c31db0d6b7ef66ad0327d4e7e2eb85f3bcc2e836a3a522c68d681e84542e471e54f765e091efe1ee4065641b0299b15613eb32dcc0d
-
Filesize
526B
MD50b5ee65c9a31ea75272582a933a9abc1
SHA13880d8364724b845c5cf88b0db3ddb0cb64c008f
SHA256843f626cd6786e377981e6ccf27f615a2643c813ba3311136dda78b211c84e0c
SHA5123f1a2242dd31b8a877344a39c4c95123b75986a6c102397b7a365e87e0be33b7354a276f0eaa6a2a34bf94628d566e637419921ceca8fff70ef564603a3791c9
-
Filesize
5KB
MD554890443420c0df08c28f0a48c7f623b
SHA1281fd8ac91e58a78ad452e3c82950b638ea53ab6
SHA256500e6920cf25afdd5deea71788a0ac826619b09caefff0d4fc8e05a6924290e9
SHA5121d848368c515afaa5afec83b96ff5760c557eeb04c2168a4a7a173b0b9774eaf5e5b2217ff434925c7350fef76d5626deb6f82fda29b131797c623be991628ff
-
Filesize
5KB
MD5b74b9249a37cf84f8d2e743b0e088521
SHA1b47c065cf5054f6864ee7e7320188a6f889c2713
SHA256b61b17a7ab1b2e5450a08964514d996cc2669f55fc52d3788020393776021c55
SHA5129deca6da178bb1d43315ba3c15f25f373b6d9ede8796341c58362d516f9e0c9ccf1651412600fd3e4e955173b330d46510c1ec09a92a3d1eb35ed16bc3b37d32
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06