Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
203s -
max time network
202s -
platform
windows11-21h2_x64 -
resource
win11-20240426-en -
resource tags
arch:x64arch:x86image:win11-20240426-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/05/2024, 18:59
Static task
static1
Behavioral task
behavioral1
Sample
uiso9_pe.exe
Resource
win11-20240426-en
General
-
Target
uiso9_pe.exe
-
Size
4.9MB
-
MD5
5a2000a241a6947c060ee63425d7ebef
-
SHA1
d80bbe4769b5e00886797d6f7c30063031eb5699
-
SHA256
5f26ba6ce5a487a3c9ec7663143f6d661c5500d0dd593274bd4ab6e78815d236
-
SHA512
cf4155b56d878d1d4c8b18669d6aa700c626fa5b2f67719bb8b2f8378059003046f437ae223a7aef6336d95cb82eeeb057910a432c135bbc4d94619a8bbfde1a
-
SSDEEP
98304:JUj8/4MycvvCf9uOj5zXSdcrRsMZtuS0xbN0yjqnolKIMPgZrx/CpSSMD/zCDK8:Oj3MychOBXSdclsotcYyEGMPqrxo0zCP
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\devmgmt.msc mmc.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 60 IoCs
description ioc Process File created C:\Program Files (x86)\UltraISO\lang\is-CC8JG.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-JV27T.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-CVNC9.tmp uiso9_pe.tmp File opened for modification C:\Program Files (x86)\UltraISO\unins000.dat uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-FRMHO.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-L5S0J.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-OJE7M.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-0PKFN.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-ALQAM.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\unins000.dat uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-3ALNV.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-BG3V9.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-LTHJ9.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-Q9GSD.tmp uiso9_pe.tmp File created C:\Program Files (x86)\Common Files\EZB Systems\is-PK1RD.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-O06OK.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-RTTC0.tmp uiso9_pe.tmp File opened for modification C:\Program Files (x86)\UltraISO\backup uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-DGE6E.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-8UT1A.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-BHEJ8.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-A6SNL.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-IPNOJ.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-LQL5J.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-MF6I0.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-GM80I.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-ULKJN.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-8RP16.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-B7PJ3.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-ANDLQ.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-RHJ4I.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-NGTOT.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-QKEKP.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-7J2OK.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-N8UVM.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-D8BRD.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-K30P3.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-GRA7L.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-V4QRK.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-2AC7P.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-HRF2V.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-DPFOD.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-HBHN4.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-50GDR.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-KH9JC.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-PJL05.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-3LP93.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-N9A5C.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-I3BKD.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-9AMLV.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-BO5PJ.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-1UH8S.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-T9K9P.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-1N60B.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-MAH0E.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-CDGQS.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-1OV63.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\drivers\is-NO4M5.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\lang\is-353D0.tmp uiso9_pe.tmp File created C:\Program Files (x86)\UltraISO\is-P68GR.tmp uiso9_pe.tmp -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\INF\c_holographic.PNF mmc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File created C:\Windows\INF\remoteposdrv.PNF mmc.exe File created C:\Windows\INF\c_fsreplication.PNF mmc.exe File created C:\Windows\INF\c_monitor.PNF mmc.exe File created C:\Windows\INF\c_scmvolume.PNF mmc.exe File created C:\Windows\INF\PerceptionSimulationSixDof.PNF mmc.exe File created C:\Windows\INF\c_receiptprinter.PNF mmc.exe File created C:\Windows\INF\c_extension.PNF mmc.exe File created C:\Windows\INF\c_ucm.PNF mmc.exe File created C:\Windows\INF\c_fscfsmetadataserver.PNF mmc.exe File created C:\Windows\INF\c_fsinfrastructure.PNF mmc.exe File created C:\Windows\INF\c_fscontentscreener.PNF mmc.exe File created C:\Windows\INF\c_linedisplay.PNF mmc.exe File created C:\Windows\INF\ts_generic.PNF mmc.exe File created C:\Windows\INF\c_fscopyprotection.PNF mmc.exe File created C:\Windows\INF\c_primitive.PNF mmc.exe File created C:\Windows\INF\c_smrvolume.PNF mmc.exe File created C:\Windows\INF\c_fsactivitymonitor.PNF mmc.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File created C:\Windows\INF\dc1-controller.PNF mmc.exe File created C:\Windows\INF\c_fssystemrecovery.PNF mmc.exe File created C:\Windows\INF\c_media.PNF mmc.exe File created C:\Windows\INF\c_scmdisk.PNF mmc.exe File created C:\Windows\INF\c_proximity.PNF mmc.exe File created C:\Windows\INF\c_fsphysicalquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_camera.PNF mmc.exe File created C:\Windows\INF\c_diskdrive.PNF mmc.exe File created C:\Windows\INF\c_apo.PNF mmc.exe File created C:\Windows\INF\rawsilo.PNF mmc.exe File created C:\Windows\INF\c_fshsm.PNF mmc.exe File created C:\Windows\INF\c_fsundelete.PNF mmc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe File created C:\Windows\INF\c_mcx.PNF mmc.exe File created C:\Windows\INF\c_processor.PNF mmc.exe File created C:\Windows\INF\c_fscontinuousbackup.PNF mmc.exe File created C:\Windows\INF\rdcameradriver.PNF mmc.exe File created C:\Windows\INF\c_fsopenfilebackup.PNF mmc.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File created C:\Windows\INF\c_fssystem.PNF mmc.exe File created C:\Windows\INF\c_nvmedisk.PNF mmc.exe File created C:\Windows\INF\c_netdriver.PNF mmc.exe File created C:\Windows\INF\wsdprint.PNF mmc.exe File created C:\Windows\INF\c_fssecurityenhancer.PNF mmc.exe File created C:\Windows\INF\c_magneticstripereader.PNF mmc.exe File created C:\Windows\INF\c_display.PNF mmc.exe File created C:\Windows\INF\c_smrdisk.PNF mmc.exe File created C:\Windows\INF\c_fsantivirus.PNF mmc.exe File created C:\Windows\INF\xusb22.PNF mmc.exe File created C:\Windows\INF\c_computeaccelerator.PNF mmc.exe File created C:\Windows\INF\c_fscompression.PNF mmc.exe File created C:\Windows\INF\digitalmediadevice.PNF mmc.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File created C:\Windows\INF\c_sslaccel.PNF mmc.exe File created C:\Windows\INF\c_cashdrawer.PNF mmc.exe File created C:\Windows\INF\c_fsquotamgmt.PNF mmc.exe File created C:\Windows\INF\c_fsencryption.PNF mmc.exe File created C:\Windows\INF\c_barcodescanner.PNF mmc.exe File created C:\Windows\INF\miradisp.PNF mmc.exe File created C:\Windows\INF\c_firmware.PNF mmc.exe File created C:\Windows\INF\oposdrv.PNF mmc.exe File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
Executes dropped EXE 5 IoCs
pid Process 2108 uiso9_pe.tmp 3932 isocmd.exe 5112 UltraISO.exe 4656 UltraISO.exe 1428 UltraISO.exe -
Loads dropped DLL 3 IoCs
pid Process 5000 regsvr32.exe 4656 UltraISO.exe 1428 UltraISO.exe -
Registers COM server for autorun 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\InprocServer32\ = "C:\\Program Files (x86)\\UltraISO\\isoshl64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 38 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000002 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Phantom mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\CompatibleIDs msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_MSFT&PROD_VIRTUAL_DVD-ROM\2&1F4ADFFE&0&000001 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 msinfo32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs msinfo32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{83da6326-97a6-4088-9453-a1923f573b29}\000A\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0005\ mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Phantom mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{a8b865dd-2e3d-4094-ad97-e593a70c75d6}\0014 mmc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags mmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 mmc.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msinfo32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\ECFirmwareMajorRelease msinfo32.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\UltraISO\ = "{AD392E40-428C-459F-961E-9B147782D099}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shellex\ContextMenuHandlers\ISOShell regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shellex\ContextMenuHandlers\ISOShell\ = "{AD392E40-428C-459F-961E-9B147782D099}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.ui\ = "UltraISO" uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\ContextMenuHandlers\UltraISO\ = "{AD392E40-428C-459F-961E-9B147782D099}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shellex\ContextMenuHandlers\ISOShell\ = "{AD392E40-428C-459F-961E-9B147782D099}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu\CurVer\ = "ISOShell.UIContextMenu.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.isz uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu.1\ = "UIContextMenu Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\VersionIndependentProgID\ = "ISOShell.UIContextMenu" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\TypeLib\ = "{1CD46142-F3D3-4E46-87BA-7CC019142F9D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu\ = "UIContextMenu Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\ = "UltraISO File" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shell\Convert to ISO uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shell\open\command\ = "\"C:\\Program Files (x86)\\UltraISO\\UltraISO.exe\" \"%1\"" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shell\open uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\UltraISO\ = "{AD392E40-428C-459F-961E-9B147782D099}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1CD46142-F3D3-4E46-87BA-7CC019142F9D}\1.0\0\win64\ = "C:\\Program Files (x86)\\UltraISO\\isoshl64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\DefaultIcon uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\DefaultIcon\ = "\"C:\\Program Files (x86)\\UltraISO\\UltraISO.exe\",0" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shell uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1CD46142-F3D3-4E46-87BA-7CC019142F9D}\1.0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1CD46142-F3D3-4E46-87BA-7CC019142F9D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shell\open\command\ = "\"C:\\Program Files (x86)\\UltraISO\\UltraISO.exe\" \"%1\"" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1CD46142-F3D3-4E46-87BA-7CC019142F9D}\1.0\ = "ISOShell 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1CD46142-F3D3-4E46-87BA-7CC019142F9D}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shell\open\command uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\DefaultIcon\ = "\"C:\\Program Files (x86)\\UltraISO\\UltraISO.exe\",0" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shellex\ContextMenuHandlers regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu\CLSID\ = "{AD392E40-428C-459F-961E-9B147782D099}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1CD46142-F3D3-4E46-87BA-7CC019142F9D}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.ui uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.bin\ = "binimage" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shell\open\command uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shellex\ContextMenuHandlers\ISOShell regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\ProgID\ = "ISOShell.UIContextMenu.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ISOShell.UIContextMenu.1\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\TypeLib\ = "{1CD46142-F3D3-4E46-87BA-7CC019142F9D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shell uiso9_pe.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\UltraISO\shell\open\ = "Open with &UltraISO" uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage uiso9_pe.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shellex regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\binimage\shellex\ContextMenuHandlers regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{AD392E40-428C-459F-961E-9B147782D099}\InprocServer32\ = "C:\\Program Files (x86)\\UltraISO\\isoshl64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{9653DE66-C5E0-4AEE-ADE5-0197BA68CE2B}\ = "IUIContextMenu" regsvr32.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4484 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 2192 mmc.exe 4656 UltraISO.exe 2092 msinfo32.exe 768 OpenWith.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 676 Process not Found -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: 33 2192 mmc.exe Token: SeIncBasePriorityPrivilege 2192 mmc.exe Token: 33 2192 mmc.exe Token: SeIncBasePriorityPrivilege 2192 mmc.exe Token: 33 3924 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3924 AUDIODG.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2108 uiso9_pe.tmp -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 2192 mmc.exe 2192 mmc.exe 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 4484 EXCEL.EXE 768 OpenWith.exe 664 OpenWith.exe 2356 OpenWith.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2712 wrote to memory of 2108 2712 uiso9_pe.exe 80 PID 2712 wrote to memory of 2108 2712 uiso9_pe.exe 80 PID 2712 wrote to memory of 2108 2712 uiso9_pe.exe 80 PID 2108 wrote to memory of 5000 2108 uiso9_pe.tmp 82 PID 2108 wrote to memory of 5000 2108 uiso9_pe.tmp 82 PID 2108 wrote to memory of 3932 2108 uiso9_pe.tmp 83 PID 2108 wrote to memory of 3932 2108 uiso9_pe.tmp 83 PID 2108 wrote to memory of 3932 2108 uiso9_pe.tmp 83 PID 2108 wrote to memory of 5112 2108 uiso9_pe.tmp 86 PID 2108 wrote to memory of 5112 2108 uiso9_pe.tmp 86 PID 2108 wrote to memory of 5112 2108 uiso9_pe.tmp 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\uiso9_pe.exe"C:\Users\Admin\AppData\Local\Temp\uiso9_pe.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\is-GLSRI.tmp\uiso9_pe.tmp"C:\Users\Admin\AppData\Local\Temp\is-GLSRI.tmp\uiso9_pe.tmp" /SL5="$40234,4629041,128512,C:\Users\Admin\AppData\Local\Temp\uiso9_pe.exe"2⤵
- Drops file in Program Files directory
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\UltraISO\isoshl64.dll"3⤵
- Loads dropped DLL
- Registers COM server for autorun
- Modifies registry class
PID:5000
-
-
C:\Program Files (x86)\UltraISO\drivers\isocmd.exe"C:\Program Files (x86)\UltraISO\drivers\isocmd.exe" -i3⤵
- Executes dropped EXE
PID:3932
-
-
C:\Program Files (x86)\UltraISO\UltraISO.exe"C:\Program Files (x86)\UltraISO\UltraISO.exe"3⤵
- Executes dropped EXE
PID:5112
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:1292
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4232
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:2212
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}1⤵PID:484
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" C:\Windows\system32\devmgmt.msc1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2192
-
C:\Program Files (x86)\UltraISO\UltraISO.exe"C:\Program Files (x86)\UltraISO\UltraISO.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
PID:4656
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x00000000000004D8 0x00000000000004B81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
C:\Windows\system32\msinfo32.exe"C:\Windows\system32\msinfo32.exe" "C:\Users\Admin\Desktop\UndoUninstall.nfo"1⤵
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
PID:2092
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\Desktop\CloseConvert.vbe"1⤵PID:460
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\SyncImport.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4484
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:4452
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵PID:5052
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:768
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:664
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:2356
-
C:\Program Files (x86)\UltraISO\UltraISO.exe"C:\Program Files (x86)\UltraISO\UltraISO.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
962KB
MD5b9e34ae6d6ecb1e19b36dc70e7ef406c
SHA1014985ed2dab57e606e08788fc9177220dd2aed1
SHA2563b8817fad300fd729d28ca4895d9fb131cf64e699fe5de658ae44c6d056dace4
SHA512d2360eb205a7f8feb9d45237f0190ef3b2444b22225bead9eedfe5301cac0601741a7d849033d3b2b5cd2a39496edc86e1d4d4444110bafefcf4a8922c6bbff2
-
Filesize
5.2MB
MD563285e1d8a23ad23dd5b163feb715059
SHA167ee1910b3dd150a1297367dacdb4b272db01644
SHA256116033b8e66845a6db4c97a134464254034228ad937e2610066e1b6a759018be
SHA512d296a019aa558e7678188277e4e83fa451add9a9e3629e0a4665565764de26e6a9806feb6d69534308907556421c94cbc4c802db04f2cf87a3a1fb3765e09fe7
-
Filesize
132KB
MD5bc81814b594286bef9913ec5ca1110d7
SHA1523fc3b657fd3fb493e0fb14c0bbf39813d1e558
SHA2569c22b6f77e929d319c5e891ee1510045dc5f486bdaf47a0696564d4d84d30379
SHA5122b65dc57a4c83c1ef243396dabf15cf53faa145bd073ac89dbf9104519e7a2b97a303c96acfdbc992e9ac19efbe65b143dd27bb6c9f7ad3e76c5eacb1b9a1889
-
Filesize
28KB
MD555677a521dd34ce7a93ab3f1d12b2dfd
SHA14316dd2b5e4ebb48886955ec5365b2f40d4298b3
SHA256fc506cb2ce0fa9a994db2e29a595f818fe93cae93dd2f8cca6f4b40944907c5c
SHA512e4e05c49701865ba349f4c037c96539cfd3da1f8cd97f9668474ca50a50db0a50e59e7f21f7e0fbc44ca1f79f7cdb529f82bc70b2a7a34e861bb5350ee783dcc
-
Filesize
151KB
MD5c0fc6c67bd9d9fbc4f8ad44232d49d11
SHA1e5ad2b56cc20652401ee5c60fe118cf3fb474a7b
SHA25650df2e7ba2ab1892dd1e8c03be51a1dfa9c1ecc501d5166cd5e69badb4a8c503
SHA51274bc8d2d93c870f0449582b6de60ade9b0322a5cca945beac8842ccd4577569ea97a7089163dcff8b0115ebbaf2ae75d09ae5214efcb8ea6902c80a2cc0e5586
-
Filesize
706B
MD54675399b02b236cc1c372557c6cb645e
SHA16e1bbd82402f0f6faa4a80baca6ecda226230ba2
SHA256ff2bcc4417a035df177b51e79ec5c5ffc03b7b9a23bfc96a6f0554a6d18d2508
SHA512420b141eb7aaabf92628e0938133b4d5e3e38a26195bb32cc8211f63135668aa00e8cb8fe6645a6e30cb56dfd486ad5f1cb3771e780976528d577ba89b246866
-
Filesize
771KB
MD53de2992c86c78e781881e9c0db26a32f
SHA1c26845ca7319a66432304a955cecdad4f977d040
SHA256e9700438d88e5a5f54d6940a4129477e943dcd4b95b006d0b38ef1e2a566a642
SHA51288d318e3265ac733408836592f87349a7bd2be1ae34e92ef7bd302926ff69b4a072300d5eac07cffdf91929b24ae08818c7cfb42cc825afaacd29250f7cae6a6