Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 13:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe
Resource
win7-20240508-en
General
-
Target
2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe
-
Size
5.5MB
-
MD5
cfecf5c2290aa061900a3873c6594e32
-
SHA1
2fcb9cf9ad0520afaef2718fa2448923a078ab13
-
SHA256
243e3d0323b14bc6851e8b028a16edf3cb3de1e68baf83de7156b291fe14d5ff
-
SHA512
724713b9b906c3d34e9320f8ea9a8ca89c60916b5364c2ac13479c7c59e9b252054c0588d8e99ad40d6b52c84c20e52e23d8809be5d8e52b89f155f611f12902
-
SSDEEP
49152:wEFbqzA/PvIGDFr9AtwA3PlpIgong0yTI+q47W1Ln9tJEUxDG0BYYrLA50IHLGfo:eAI5pAdVJn9tbnR1VgBVmGqo4w
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 804 alg.exe 4236 DiagnosticsHub.StandardCollector.Service.exe 3588 fxssvc.exe 2844 elevation_service.exe 452 elevation_service.exe 1172 maintenanceservice.exe 3368 msdtc.exe 468 OSE.EXE 4336 PerceptionSimulationService.exe 3924 perfhost.exe 4352 locator.exe 1576 SensorDataService.exe 748 snmptrap.exe 3816 spectrum.exe 3496 ssh-agent.exe 3396 TieringEngineService.exe 3412 AgentService.exe 4428 vds.exe 2844 vssvc.exe 5184 wbengine.exe 5336 WmiApSrv.exe 5444 SearchIndexer.exe 5868 chrmstp.exe 5924 chrmstp.exe 6072 chrmstp.exe 776 chrmstp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\system32\AppVClient.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\3d9337378beeeac9.bin alg.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\locator.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\System32\snmptrap.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\spectrum.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\vssvc.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\AgentService.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\System32\alg.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\System32\SensorDataService.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\wbengine.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\msiexec.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\system32\SgrmBroker.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\System32\vds.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jre-1.8\bin\jjs.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jp2launcher.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AdobeCollabSync.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\FullTrustNotifier.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\xjc.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\wow_helper.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ShapeCollector.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\policytool.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmid.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{F3190C87-06A4-407A-A58A-3F71181B4541}\chrome_installer.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Internet Explorer\ExtExport.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\7-Zip\7z.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\kinit.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\servertool.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\AcroLayoutRecognizer.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\java-rmi.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jp2launcher.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\tnameserv.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Mozilla Firefox\default-browser-agent.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jjs.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Eula.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\64BitMAPIBroker.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9902 = "Movie Clip" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Multimedia SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-12385 = "Favorites Bar" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-101 = "Microsoft Excel Worksheet" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9912 = "Windows Media Audio file" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-34583 = "Saved Pictures" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{3DBEE9A1-C471-4B95-BBCA-F39310064458} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000002656146ecca6da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{E0F158E1-CB04-11D0-BD4E-00A0C911CE86}\Default DirectSound Device SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1134 = "Microsoft Routing Extension" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000f82e0d6ecca6da01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-120 = "Microsoft Word 97 - 2003 Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Common Files\system\wab32res.dll,-10100 = "Contacts" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\wshext.dll,-4804 = "JavaScript File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9935 = "MPEG-2 TS Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-6 = "Microsoft Cyrillic to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003bd1716fcca6da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.xhtml SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-103 = "Microsoft Excel Macro-Enabled Worksheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-912 = "HTML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9923 = "Windows Media playlist" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\cabview.dll,-20 = "Cabinet File" SearchProtocolHost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-913 = "MHTML Document" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E46787A1-4629-4423-A693-BE1F003B2742} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000077b8166ecca6da01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21825 = "3D Objects" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\msinfo32.exe,-10001 = "System Information File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.snd\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-125 = "Microsoft Word Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9938 = "3GPP2 Audio/Video" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-142 = "Microsoft OneNote Table Of Contents" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-175 = "Microsoft PowerPoint Slide Show" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9926 = "M3U file" SearchProtocolHost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrmstp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 404 chrome.exe 404 chrome.exe 5864 chrome.exe 5864 chrome.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 656 Process not Found 656 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3420 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe Token: SeTakeOwnershipPrivilege 4764 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe Token: SeAuditPrivilege 3588 fxssvc.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeRestorePrivilege 3396 TieringEngineService.exe Token: SeManageVolumePrivilege 3396 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 3412 AgentService.exe Token: SeBackupPrivilege 2844 vssvc.exe Token: SeRestorePrivilege 2844 vssvc.exe Token: SeAuditPrivilege 2844 vssvc.exe Token: SeBackupPrivilege 5184 wbengine.exe Token: SeRestorePrivilege 5184 wbengine.exe Token: SeSecurityPrivilege 5184 wbengine.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: 33 5444 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 5444 SearchIndexer.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe Token: SeShutdownPrivilege 404 chrome.exe Token: SeCreatePagefilePrivilege 404 chrome.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 404 chrome.exe 404 chrome.exe 404 chrome.exe 6072 chrmstp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4764 3420 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe 82 PID 3420 wrote to memory of 4764 3420 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe 82 PID 3420 wrote to memory of 404 3420 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe 84 PID 3420 wrote to memory of 404 3420 2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe 84 PID 404 wrote to memory of 3660 404 chrome.exe 85 PID 404 wrote to memory of 3660 404 chrome.exe 85 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 1044 404 chrome.exe 92 PID 404 wrote to memory of 2072 404 chrome.exe 93 PID 404 wrote to memory of 2072 404 chrome.exe 93 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 PID 404 wrote to memory of 4920 404 chrome.exe 94 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-05-15_cfecf5c2290aa061900a3873c6594e32_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=113.0.5672.93 --initial-client-data=0x2c8,0x2cc,0x2d0,0x29c,0x2d4,0x140462458,0x140462468,0x1404624782⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffc840eab58,0x7ffc840eab68,0x7ffc840eab783⤵PID:3660
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1616 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:23⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:2072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2208 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:4920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=3056 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:13⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3092 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:13⤵PID:3716
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4384 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:13⤵PID:3948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4524 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4556 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:4420
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4664 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:5972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4360 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:5316
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings3⤵
- Executes dropped EXE
PID:5868 -
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x298,0x29c,0x2a0,0x268,0x2a4,0x14044ae48,0x14044ae58,0x14044ae684⤵
- Executes dropped EXE
PID:5924
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=04⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:6072 -
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x14044ae48,0x14044ae58,0x14044ae685⤵
- Executes dropped EXE
PID:776
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4636 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:83⤵PID:5588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2304 --field-trial-handle=1884,i,12252591401483818052,12572128804436897125,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:5864
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:804
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4236
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:4376
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2844
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:452
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:1172
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:3368
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:468
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4336
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:3924
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:4352
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:1576
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:748
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3816
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:3496
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4144
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3412
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:4428
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2844
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5184
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:5336
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:5444 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:5604
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 916 920 928 8192 924 8962⤵
- Modifies data under HKEY_USERS
PID:5676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD52d17a9f2144f87d26ef9012e52163b5d
SHA10d7b43df24460be4034dfd437152776958130966
SHA25663b657fc1bbf57d814b3ea896fa45199e1de82e2e037e4c41ccf59007d8a5e27
SHA51241040d66dbab9ad32546ebfd9a67221e0e0bdb0852563221dcfeacb46d6bcdf4d70450eb44b9da71b3d666d14ba1c36508f77de539b7a1b93486a2f62b9e1bb4
-
Filesize
797KB
MD506a1d79a7cd59b37fcd48d10889b38a4
SHA1a44dce7eec0e2a1f9a63b1393694c2165b711578
SHA2564f487abc3012f582eb5b7fe4b40769efadae2c832a07f3a35d64816eb7f646f0
SHA5125b671db2b4aa7b908424204010e78fe904bc2192b3da3090c90183e3f76ea42979fe879a0fc89cbefade7aa929fe525543c0c812f44907210671c042b9f0a793
-
Filesize
805KB
MD5f53425d67217598eb85de3a5640ef33f
SHA1ada2f153f34f00756c327d750a9a1e121c3028a0
SHA256f1b5166cc92f02508fbcf57d942ae3c3e1952d5084fcf9c13e8b5ee8e3fc2dcc
SHA5121abbb3194c325910eb4f9d4495f5e78cd39d7dcc36a33333babfdf820b32ca0c8cf2374ddd6d12dde015b6ea52da61166ffd27d8dee704d9950a61333c54f837
-
Filesize
5.4MB
MD565874276978a69627ee7ac3be740da6b
SHA156f5a80af685b1d6d65cb6436ead679dd6a4ab9f
SHA256696b2a5455d05382df08cae5c8d06a42eb968af8ed010bec17ae9110b183e2d8
SHA512f8e5f7cc9ef6241c12a4ef214aa6d076ca1e44306a3dbc7a45b8597ce9ac9c479e800cc2e5fdcbce3f4e4454f287f059791dfb209f8e4cc3303b1a695811f080
-
Filesize
2.2MB
MD5d38533ce9e9dadb7182ad78b37b8e792
SHA18054991f0acae4b3d7a902e481e911d75c7171e7
SHA256577b8a64cfa7635e8b6c6d968bf74bc4761f32db60d64ad7fe841a4e2dfd316c
SHA512d967359aa189ea4e9bf119a3b8b674afaedf360a75e89e47cee46deb7f01784a00afc5e21a89f67192c82437b916982390c3ae498a47e8e829fe6c8e4ac4c86e
-
Filesize
488B
MD56d971ce11af4a6a93a4311841da1a178
SHA1cbfdbc9b184f340cbad764abc4d8a31b9c250176
SHA256338ddefb963d5042cae01de7b87ac40f4d78d1bfa2014ff774036f4bc7486783
SHA512c58b59b9677f70a5bb5efd0ecbf59d2ac21cbc52e661980241d3be33663825e2a7a77adafbcec195e1d9d89d05b9ccb5e5be1a201f92cb1c1f54c258af16e29f
-
Filesize
40B
MD590b8e3c077c7289cf4b7078243e26f76
SHA1c8e3387c59c20fcff770b846e972a52f7f93591c
SHA256001c51870a28710313d50d9037f261881517a384d3e502d9112b04ea2e8538a1
SHA5124461003ce00d03608509d7ab645b933ec95c398623a1d8c6440c8a5b069d32e73aff391a1d3954511dfca7da698c0820970017b66629e3647800e5cc3920f1cf
-
Filesize
193KB
MD5ef36a84ad2bc23f79d171c604b56de29
SHA138d6569cd30d096140e752db5d98d53cf304a8fc
SHA256e9eecf02f444877e789d64c2290d6922bd42e2f2fe9c91a1381959acd3292831
SHA512dbb28281f8fa86d9084a0c3b3cdb6007c68aa038d8c28fe9b69ac0c1be6dc2141ca1b2d6a444821e25ace8e92fb35c37c89f8bce5fee33d6937e48b2759fa8be
-
Filesize
1KB
MD5a285c55d53b0b9caabcaa883351ccaa8
SHA1b553b74dc3aa6afe6812c1dd9f575d557b1bd419
SHA256796bcfb97b0d797007807844cd3e4209021949f84493d29798a7c8333634ebf7
SHA5122d1984e7eab5e736a70bfad2a96fe35fba3cdbc8dcccc0236b6ef47b9db78e89f654c6bc3a17b801fc52ba33c208ddd496cbb8304b2830ff105a0453fd75bc25
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD59bbfe30e25636ae3ee016d8e6e48c695
SHA1094f5cf0ff3839fa8c21b4396ca45556f4b8792a
SHA2562e7387bf0c5a8aedb22abe84f3c41a064e86af0efac9383881e79368f53a4b89
SHA51286cbd0ef590d53cf3f1f476613ea9374dc18e504b83b680ad37d795f9f3e9e50c6e95fdf054cb6748d12c710346dab01c1003dd1d4cdfbd726b7c3ec0a1ad1db
-
Filesize
5KB
MD58528b6d65b57faafe969b930a5be943b
SHA15fe4fc769269a90846ba2c68c1851ca9c3492cb6
SHA25670608a3c1d4102de448f081c857d8c6d4e0894fc37e4624adf75d377664bcfb6
SHA5124077138d1a667587a10a1964a05602fbb8ec3f537818e55803d9cbdc7080f471763dbd9565a681f5ffff2d5e58c11492627c388241065a93642f84ea049b7f9f
-
Filesize
2KB
MD52439032641f0c53dcd64320bfa02af0a
SHA1a1820031d22a713be8ff0a020783b7bc72860ae1
SHA25613f018fd7e8d456a16ab52c9430b449ed2f126386dc10abb8d01ff752f92db72
SHA512d9e02ab626313b138f721b369d987f45e68682f6cf2d76138195cedc75cea2237cf36677173a82672bf54ae9fe480b54f42c76af18e8e4c6cad76da85bc178d1
-
Filesize
16KB
MD5b90fc86a3cb6ada91dca97355a343864
SHA1b23306c82f1c854f5530e8a7a7b3483d66982dad
SHA2568025cc72f2b2890032f3d4e08f2bf24919e4c37a3001e6f027318f0052f6b021
SHA51260dc3ce4d07d24dedcd80e5664d13039465a6f7aa1f8333fa0099a42e54b82579c1e06be5520fbeb44f5794b0d954f60dc8118d9357f95e7ebb4fb02e1bd96ba
-
Filesize
257KB
MD510b11e81d4e84c6473b6aecef08bca71
SHA1f95cb7abbc6166a11f5da8805b165bbdb0739bff
SHA256428ee7be0d3eb7feccb736f2b66186fbce3edd3954aa0c6e8827b5846cb06e50
SHA512f04663e12c91f435125c5a7a8da46915ad1496e485a3e8bc3b2cddd295a29a62c6332f6d0f747f0430829051b7bafa419ff3b9b111cf708e731af4868fdca8d3
-
Filesize
7KB
MD5d323d3ed033fb7ce24d58681d2be08cd
SHA185348803a9055a4cdfc148da750c2c41ecb788d3
SHA256bbc0296f8618cca93eecb3391d46f4940311ec9e7ca18ac3dffec2e49d111d6f
SHA5122facf9bd1f3254af690f4a04196083a391ebe35647712a272fae2344c952cf7358e7f491e8027ffa653e7916281e32dd968af30ba887ade50fda07c51c5c9e0e
-
Filesize
8KB
MD537a2153ff0106e2afb204760acd55e84
SHA137ac753fab39d1c7bf1a88671a60289303fdeecf
SHA256b27e27b628407625bd122a412d43b8c5849777e95a37825caf83e7e13088b598
SHA5125e14ffd48012257b1b26081be02fde0b2e6b4490594d91a848a96dff7dce87aa3496b4080b16f1a56e07e78673cc4f73e464b34f3f673dddaf7e6195ec8f5a8a
-
Filesize
12KB
MD53493d282d465e6d996fdc6fabbfb65ba
SHA1009657e6e25e18729f7548fd13954f7545d62a62
SHA2561629a5f81a65ae4cb2e11174c0f84e98f4b84856ab59da16b2602f24c92eeddd
SHA51283e323af0872d0b3313aa711e1b3fa3862f8c6b1e83b1cac099f75b0e5af7127f0252f65feb0f6bd60bb8e91b471b592d5e33203e7e93a9e8d7b08f0b0717103
-
Filesize
588KB
MD55702bd9e13a88358b86b4a98999c250e
SHA163a361b2b9d9eca75ed920588e12c600f8090918
SHA256fd763e1ba799c2be5e45d536761d244167fd7bed42be42f20244be2078fc2b95
SHA51200532b7a694acc81f27e5d357ce6fa080672937ae6f7ff4b8a603937507ed0fb973688e70dbe3ce6aee6a695711d7b51b4e6ad5f344b07c010843ff521e4944c
-
Filesize
1.7MB
MD5c7ec82c1d36b2dc6cbfa989af6d041ad
SHA108b3f04fea69247a2bb210d519dbafc0b5f1bfd5
SHA25653d5c08ca858e9c4ecad95914951808b82470230e4ffae443a808ae468442792
SHA51273763531858b8733d0f9f2a8819f62bd91ae5ebb29e77d4293226ef304d80267de02014c1f934671764e025875204c8e4bcc83ea87ae5d5f7d9ad8fdc4037de7
-
Filesize
659KB
MD5850e16db618bd5d848bcd794aaeddda1
SHA11f6c7a8ef07d9a4725db4190934f8334e9105efb
SHA2563b32355d89950c81e8515bdf50b05c5cc6907b73c72cae889ac1f8124232234d
SHA512c4106e1fc61c5c1411f4a539e1f987a69d808b326263a720b987c88ef2fe32e27a5819ad1a2fe24e67d34efac0a154792b550c6c19ea6454812db5d754a3a49e
-
Filesize
1.2MB
MD577d784195f16e485b81f36620547e485
SHA1e7fb13c3040cb9aa17cd26b0f4b2c3ed12f8f66c
SHA256cec24cf932378f72e679617e0725274aff0ca1efdce24def336bd7060f6d11ce
SHA512000a9e85ec6b06fcf2e9a481e9a878b6359eb13f9ba89db524c7d33a186c183363dc355837bb8b4e29ab974a72260d99492ef479af9b4adc63f424da71f72e8a
-
Filesize
578KB
MD5a3ef8cedcc42c73c8d69e83043e81f4c
SHA148f2a8a3588370ef05c6f68bf75b1ba74a27805a
SHA256fb55ea02a6e389c1fb182857fb4f8fe12018aabaa94cfb9dd36d33bce9347267
SHA512f1a04f1b0fecddd7a89bc72f7fbb9606a02feecd49de7aab0eb156bb0c061231e195025025f627c69854fdd90efdb54a76f16137995153ae6a1225d99c1419d3
-
Filesize
940KB
MD5bca27f6e64fbd32cb9eb2a49d7641a92
SHA19168fd3621e55b807077cc5adc00365e311c2db2
SHA2569466190e34cea281a494fa25e1118bd66b092d23077793847f3a94de90f94e99
SHA512c49c62bdfa058403e9448f97fdb11d8932ab0a4d4afcb83df8cf4496fb742ac5b5bb6842ae363b0dc61dc2887f4148fb931fbee5ae23c1cb30d7b94dc81a2bcb
-
Filesize
671KB
MD51cd4eba7fc22c059b52dca72c96812d4
SHA185a23da0aae6ba346e1e225eba1d24b92b6e0ea5
SHA2560e085125c414cc4c6213a2bf265311cf5e38806dbfd1dd7206e5112a70a8b096
SHA512fc4882861886d5e419966eac4c34b1c951a5aae5956f2eb65c62b9b3e2b7338d7ae6283ee6d2a9824954e41d346e3c19574d4e3f909a3721482e7b0a813c32dc
-
Filesize
1.4MB
MD5635c5122055c3816d1821f1d06dc39e5
SHA1555a644ae44c6eecea100de3b20125aa524391c4
SHA256313c0666a5393abfb61794bcc0fdcd59fbd6c94002954150e7ee9362b8b7c30b
SHA512c6d3eeeac9c63b104cd8adb755d8f4a69e44b019c88d6fc4e74b3ca57e22c306b46a50903cf1124d3caa8c1611747a49e6d34df8db722de7e565fb9caf46a0f5
-
Filesize
1.8MB
MD5713ca5ac5de34b60cb5c2a28c6eefa3e
SHA1c89b064aef3c343e565c9fb4092068ad7fb7d3ce
SHA2563ab00be6ed10897690af88beaf44c6ec6b3743dda05b5c8a4473c7793bed0fd7
SHA512f47cfef97cdb143693102ab771bb3c147339828cff39692498e9ce9cdd434169b4c3423820850ec24354b0bd6986c8f8167ce839e64550ccb465c3e642995b6e
-
Filesize
1.4MB
MD5837382528dc8087afd63cd5b96b8c97b
SHA1600e6ca4d595ac848c5f0e525502e428c452d4d3
SHA2565c0c4c97aa2b9c7ed4f0d6d67f7717336ff6e19d3b82dbc1cf5fda4297fcab55
SHA512eb5f1afb313830ee3a5c5d09f56f7c0ed05c48428b55bf8b0d37660a43f33405679394ebb948aead78f868d2e77bf436b6d967c3ce55c3511dd89e1f8e16b9c2
-
Filesize
885KB
MD526d62103bd9440af71e2315f2a596275
SHA1e7d2e4f5d000a70879d5982f574107d4d047c3ea
SHA256ddc2840cc3b43c86655c324a3a045e6bcdaf9a71878844c43dffcb13fe711bf2
SHA5128911b7ad910a580222e9f55139c2b61b965d8e6112a3e41ba076aba2bdb673166d0abf3f867802eca56823fe5b3d87aec27f33e50e12ce0d7090fb5848c90581
-
Filesize
2.0MB
MD5102f3bf7bfa7825feeebed910e58c281
SHA1c78fb7dfe7763d38a26fc4aeba5713513ea8c16d
SHA25618bbfa7b795306e02c3a62e35e814d8d257d478b0c90cfa91cd041a242effeb6
SHA5128a89a5ed844674bfebcc88795c0b78eaaa4d3a6f65d3485501d20864a7e2c2aacbf15f714906c1c6bf11459e465066e49156dd1d3e6522729a05b24739e82d00
-
Filesize
661KB
MD5e82b1c72eb8b1778e44f4424a1ad0f92
SHA112c97413dffb7e59e364cef13a677065675c20c8
SHA256411fadb2d99656e4be51bcfbe22a1eb0c245cad8bf21cd9e37f350f9e4d0a2a0
SHA5121b4810c1ad301212c9167fc343a9595f848b68c30a50aa5ae04ef726a45b3fae480a4361585a2441f5c59882825758125cdc9c27de0a69d6ca1f9c6ff4b01bdb
-
Filesize
712KB
MD5788ea444fdd16f1899d9bd5cceb5ad89
SHA11e66f86921f22f11f4fe5c47dff3271d69a7cf22
SHA256eeee0538eb6fab87ce9ad8664cc373cdaf681bc006b79580d3efca9f42d353a3
SHA51225bc02e98bf42761ab960e5f87bb078cdce1587b94e73b174a7852ff6c391f46d8d254760e6d51ab724e4716efb6f7078b60c5e385e58a0d9a22fe6aa7ccd025
-
Filesize
584KB
MD561e57675fbe921935c55b1e16b5b0bd0
SHA1a4f9163a434200c565c55b9b4a7c538640e26bd0
SHA25664dc3a996932a292f7ef7be5e900b89b4ea3cd25b7899e8ef50fb5178ce5a5fc
SHA512fbf8bc4d0b0fe515d1d20a4e19ab5145870e3b90de8c614f14288e2fd2198134c75e28eea4d4a21e60ec5085d82f72c7c78134fb1c0b4d9d2a7d699b5a3d1194
-
Filesize
1.3MB
MD5d94d841901819e2004ee0baddd1d6ef1
SHA10ac6dc64e3f574376639835f688b4b79ad83e993
SHA256148ad84a603fd9b01136b3f3a4a3ee0e57fac1e913d858d0ec260d8e84d17213
SHA5125e659e3fad737ebe8067db03201becbb391b6f14ed63446bec4cd94fe142b39d8ec0e845a8db04cf834fb328fd0b40091f677dc6146544115030eb419cc2b723
-
Filesize
772KB
MD5c72f759d6d707124a174494aeaa2af3c
SHA1a37e9f15b5584ea72449b5801d0c394a78916bcb
SHA256ec6d7c470645566c5c293b1b8fee5808b45e0286f6b44947ed53379232e1d3d9
SHA5127fcccab3dc375280be0d77325d8e2f315d2db29945d121efc191379af99505b7c345186b773a79b22991cda7862ad8c360b500e422caf1bfb0176f7a9532c761
-
Filesize
2.1MB
MD543fde4bf7b4a1539c97094985ef6fb6c
SHA1fb8f3ff5a773eb9feff0533d1d80c6967565e35e
SHA2567b59431d01d2f1d03101acf178a0802a3313151df6611a054576c7384f3d3898
SHA5123e15f4901f9670fc36cecfd7f5a587c1f79589f6a21192fb0bbaba08854085601de3cc49c7aaef59e477022113b74d95983bc3abf60b64e304d601640cd1beb0
-
Filesize
40B
MD50a8c17e97526f751a8aa475e8c8b7983
SHA12cb070d16a547e867aca22af457f13c44c17d0e2
SHA25681519c37e7b764606c063607c2fdc287f28845aed7cce899222c4f714f16f860
SHA51240a71708d63ea949f7132ef01340b3202eb349119623aa849b0e103e4b7ddbea543ba7ebe98b255eb58e26ac050c09a1dde89327f31deaa77f483dcf16136593