Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 15:04
Static task
static1
Behavioral task
behavioral1
Sample
2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe
Resource
win7-20240508-en
General
-
Target
2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe
-
Size
5.5MB
-
MD5
7ad773b74c38d74338c9fa4611d2c480
-
SHA1
26481ae93065981dfca725a22ce4310525fbe961
-
SHA256
65b41dcffde124379df0ead0f187fd68a8148af3d0b8acb9955364f15c8b2f56
-
SHA512
dfebab2e546cc048a40bcbda1cade2b16af069c6c6b473fe9a06e60689df445fd4380777090f866d5663373560305781b56bf278441c69a3e31eb6efe239fdb1
-
SSDEEP
49152:OEFbqzA/PvIGDFr9AtwA3PlpIgong0yTI+q47W1Ln9tJEUxDG0BYYrLA50IHLGfy:UAI5pAdVJn9tbnR1VgBVm6Okf
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 4424 alg.exe 4572 DiagnosticsHub.StandardCollector.Service.exe 4008 fxssvc.exe 3780 elevation_service.exe 2328 elevation_service.exe 3548 maintenanceservice.exe 1552 msdtc.exe 2268 OSE.EXE 4116 PerceptionSimulationService.exe 2036 perfhost.exe 388 locator.exe 3876 SensorDataService.exe 4692 snmptrap.exe 2708 spectrum.exe 5056 ssh-agent.exe 3312 TieringEngineService.exe 4764 AgentService.exe 1492 vds.exe 1152 vssvc.exe 2964 wbengine.exe 3772 WmiApSrv.exe 3548 SearchIndexer.exe 5676 chrmstp.exe 5808 chrmstp.exe 5908 chrmstp.exe 5992 chrmstp.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 24 IoCs
description ioc Process File opened for modification C:\Windows\system32\SgrmBroker.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\System32\snmptrap.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\System32\OpenSSH\ssh-agent.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\AgentService.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\SysWow64\perfhost.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\locator.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\vssvc.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\wbengine.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\wbem\WmiApSrv.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\SearchIndexer.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\MSDtc\MSDTC.LOG msdtc.exe File opened for modification C:\Windows\system32\TieringEngineService.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\System32\vds.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\System32\alg.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\System32\msdtc.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\msiexec.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\spectrum.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\AppVClient.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\81b1caf6b4b1389a.bin alg.exe File opened for modification C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\System32\SensorDataService.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc-cache-gen.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroBroker.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Windows Media Player\wmpnetwk.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jinfo.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath\javaws.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99718\javaws.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateCore.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ssvagent.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\dotnet\dotnet.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\pack200.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\reader_sl.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99718\java.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Internet Explorer\iexplore.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\WCChromeNativeMessagingHost.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARM.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleCrashHandler64.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jps.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\ssvagent.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaws.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_99718\javaw.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\mip.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\javaw.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\javaw.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\klist.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\kinit.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\servertool.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\jabswitch.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Mozilla Firefox\uninstall\helper.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\ktab.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File created C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice.log maintenanceservice.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe File opened for modification C:\Windows\DtcInstall.log msdtc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 64 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 spectrum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 SensorDataService.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 spectrum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A SensorDataService.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 TieringEngineService.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz TieringEngineService.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\msxml3r.dll,-2 = "XSL Stylesheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1132 = "Store in a folder" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\Windows.UI.Immersive.dll,-38304 = "Public Account Pictures" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{E2FB4720-F45F-4A3C-8CB2-2060E12425C3} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000da6cb57723ceda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-170 = "Microsoft PowerPoint 97-2003 Presentation" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000002b55027823ceda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-182 = "Microsoft PowerPoint Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\zipfldr.dll,-10195 = "Compressed (zipped) Folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-4 = "Microsoft Simplified Chinese to Traditional Chinese Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{AEB16279-B750-48F1-8586-97956060175A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000e8abde7723ceda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5383EF74-273B-4278-AB0C-CDAA9FD5369E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000004233447923ceda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-172 = "Microsoft PowerPoint 97-2003 Slide Show" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9936 = "QuickTime Movie" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-180 = "Microsoft PowerPoint 97-2003 Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-3 = "Microsoft Traditional Chinese to Simplified Chinese Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{C120DE80-FDE4-49F5-A713-E902EF062B8A} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000d5f5be7723ceda01 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SBE SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.au SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-2 = "Microsoft Script Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\wshext.dll,-4802 = "VBScript Script File" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mht\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-5 = "Microsoft Transliteration Engine" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-9 = "Microsoft Bengali to Latin Transliteration" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-174 = "Microsoft PowerPoint Presentation" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-131 = "Rich Text Format" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1133 = "Print" fxssvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 010000000000000021c4b27823ceda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-114 = "OpenDocument Spreadsheet" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9933 = "MPEG-4 Audio" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-140 = "Microsoft OneNote Section" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.rmi\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.WTV\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{A38B883C-1682-497E-97B0-0A3A9E801682} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000007a21697723ceda01 SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{97E467B4-98C6-4F19-9588-161B7773D6F6} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a9a7b07723ceda01 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9907 = "MIDI Sequence" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\msinfo32.exe,-10001 = "System Information File" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@fxsresm.dll,-1130 = "Microsoft Modem Device Provider" fxssvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\C:\Windows\system32,@elscore.dll,-7 = "Microsoft Devanagari to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.pdf SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9939 = "ADTS Audio" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E\@C:\Windows\System32\ieframe.dll,-10046 = "Internet Shortcut" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133645790651808807" chrome.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ chrmstp.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 2844 chrome.exe 2844 chrome.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 660 Process not Found 660 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4492 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe Token: SeTakeOwnershipPrivilege 940 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe Token: SeAuditPrivilege 4008 fxssvc.exe Token: SeRestorePrivilege 3312 TieringEngineService.exe Token: SeManageVolumePrivilege 3312 TieringEngineService.exe Token: SeAssignPrimaryTokenPrivilege 4764 AgentService.exe Token: SeBackupPrivilege 1152 vssvc.exe Token: SeRestorePrivilege 1152 vssvc.exe Token: SeAuditPrivilege 1152 vssvc.exe Token: SeBackupPrivilege 2964 wbengine.exe Token: SeRestorePrivilege 2964 wbengine.exe Token: SeSecurityPrivilege 2964 wbengine.exe Token: 33 3548 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 3548 SearchIndexer.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe Token: SeShutdownPrivilege 1148 chrome.exe Token: SeCreatePagefilePrivilege 1148 chrome.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1148 chrome.exe 1148 chrome.exe 1148 chrome.exe 5908 chrmstp.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 940 4492 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe 81 PID 4492 wrote to memory of 940 4492 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe 81 PID 4492 wrote to memory of 1148 4492 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe 82 PID 4492 wrote to memory of 1148 4492 2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe 82 PID 1148 wrote to memory of 1556 1148 chrome.exe 84 PID 1148 wrote to memory of 1556 1148 chrome.exe 84 PID 3548 wrote to memory of 1064 3548 SearchIndexer.exe 110 PID 3548 wrote to memory of 1064 3548 SearchIndexer.exe 110 PID 3548 wrote to memory of 3932 3548 SearchIndexer.exe 111 PID 3548 wrote to memory of 3932 3548 SearchIndexer.exe 111 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 2172 1148 chrome.exe 112 PID 1148 wrote to memory of 1972 1148 chrome.exe 113 PID 1148 wrote to memory of 1972 1148 chrome.exe 113 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 PID 1148 wrote to memory of 4384 1148 chrome.exe 114 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-07-04_7ad773b74c38d74338c9fa4611d2c480_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=113.0.5672.93 --initial-client-data=0x2c8,0x2cc,0x2d0,0x29c,0x2d4,0x140462458,0x140462468,0x1404624782⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run2⤵
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffd4dd8ab58,0x7ffd4dd8ab68,0x7ffd4dd8ab783⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1640 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:23⤵PID:2172
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2160 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:83⤵PID:1972
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2220 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:83⤵PID:4384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2976 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:13⤵PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2984 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:13⤵PID:1264
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=4208 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:13⤵PID:4288
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4496 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:83⤵PID:5516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4516 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:83⤵PID:5624
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings3⤵
- Executes dropped EXE
PID:5676 -
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x29c,0x294,0x298,0x290,0x2a0,0x14044ae48,0x14044ae58,0x14044ae684⤵
- Executes dropped EXE
PID:5808
-
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=04⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of FindShellTrayWindow
PID:5908 -
C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=110.0.5481.104 --initial-client-data=0x28c,0x290,0x294,0x268,0x298,0x14044ae48,0x14044ae58,0x14044ae685⤵
- Executes dropped EXE
PID:5992
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4492 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:83⤵PID:6000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1568 --field-trial-handle=1900,i,9681436100388160240,3371470635448075916,131072 /prefetch:23⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4424
-
C:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exeC:\Windows\system32\DiagSvcs\DiagnosticsHub.StandardCollector.Service.exe1⤵
- Executes dropped EXE
PID:4572
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k NetworkService -p -s TapiSrv1⤵PID:2040
-
C:\Windows\system32\fxssvc.exeC:\Windows\system32\fxssvc.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe"1⤵
- Executes dropped EXE
PID:3780
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\elevation_service.exe"1⤵
- Executes dropped EXE
PID:2328
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3548
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1552
-
\??\c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"c:\Program Files\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2268
-
C:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exeC:\Windows\system32\PerceptionSimulation\PerceptionSimulationService.exe1⤵
- Executes dropped EXE
PID:4116
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵
- Executes dropped EXE
PID:2036
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵
- Executes dropped EXE
PID:388
-
C:\Windows\System32\SensorDataService.exeC:\Windows\System32\SensorDataService.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:3876
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵
- Executes dropped EXE
PID:4692
-
C:\Windows\system32\spectrum.exeC:\Windows\system32\spectrum.exe1⤵
- Executes dropped EXE
- Checks SCSI registry key(s)
PID:2708
-
C:\Windows\System32\OpenSSH\ssh-agent.exeC:\Windows\System32\OpenSSH\ssh-agent.exe1⤵
- Executes dropped EXE
PID:5056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s SharedRealitySvc1⤵PID:4056
-
C:\Windows\system32\TieringEngineService.exeC:\Windows\system32\TieringEngineService.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
C:\Windows\system32\AgentService.exeC:\Windows\system32\AgentService.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Executes dropped EXE
PID:1492
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵
- Executes dropped EXE
PID:3772
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Modifies data under HKEY_USERS
PID:1064
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 912 916 924 8192 920 8962⤵
- Modifies data under HKEY_USERS
PID:3932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.1MB
MD5aec9477483462ce6414b5dfec4e581f0
SHA1c7fd44b0d78467e24bd2d6b0bcf891dfa0874c84
SHA256786d02677a7752e82aa35ec4f398232cec2250fb3f3ec1c77fc94b4649deada3
SHA512c570ae1c2b3bac402ac97db4e8479125a71f091580f0610ff48731a6adc2cd5c97b3c57f388eb6ce1d9e38ecf467fe9946030a5f7a8aa74bdc83365abb616ebb
-
Filesize
797KB
MD5579b4076476373a5f3a2fa41a96c3477
SHA1129064d4057b75782df5da0794760faa19309a52
SHA2568873dce0360a4a3413cd19bd9113d6ea2a2433cba0281313fb0eec2b1d4a6414
SHA512fff266fbfc03a0e4301f8a26cd12448cd06454dc4c4eb35d0b4bebbb48252af0340706852473993588638e6ae65e6d2a27037380d1fb3d5843dfeb2db495045a
-
Filesize
805KB
MD56411821140e4193469807df05f23dfbe
SHA177a73d5b59c96ecc03298ac08b84bfc145398321
SHA2564214236deabf8f2b6e64d7dc50d91108eb74387c4eb5e7391f40efc654e83f5b
SHA512ccc4fe48b3160c18d54d32b095e80af678830bf51eabd18bbb1064717b1bf6756c1ac2033df0568da7ce3e877f88c89b2283e7cc557409cd42e6b085ad7f78e3
-
Filesize
5.4MB
MD5221981d213d60bff67a58c629f55048c
SHA1f9b29340978eb687d23ed2f1f9dae5d23acefa3b
SHA2565c6174eed10248095e1b2c08e2a458c39596c39ddee9c78cbb88e28844bb2823
SHA512d069a77618a18f7d6bcf6b76a2bd93f45585023de0f23b5ad06e7b7a6653f4e126c206af969f9b0722b9d45c4a704e9da608a4e3f1c6d543efbb56ee62170db8
-
Filesize
2.2MB
MD51edfbf2f9d063ad4cf8b1df0605fe0f9
SHA1aa3923db6217edaf8f4a2e99049e3a36e24fd55d
SHA25665c53c5b22c85771f0de4de1a2513c992926d89a22b4de7caf724e7165862f05
SHA51224571276b790ea0334b06ef07f5ed7cbb6365e977cff1e01695ca19a1412d74112d88c26c3968e62c14521937fedcf317648df8b97d52e49ecbb12fea48fb38b
-
Filesize
40B
MD52cd879c3b1b25f881f4b7ab71b67a095
SHA1e8c477526bb5bdddd659fdd44606060d83e703ad
SHA256d15ec0b42a1305238584533da0ddd5ec2959a76896cabc74599185af8af9e92a
SHA51295c25065ecb23b375e233d554beb9c5fb61d877f6b5586155d5b5931d270cedfd4508a8fde3dfee5073af2215b256d7cffde9f77923d41909d4168d9bc61123a
-
Filesize
193KB
MD5ef36a84ad2bc23f79d171c604b56de29
SHA138d6569cd30d096140e752db5d98d53cf304a8fc
SHA256e9eecf02f444877e789d64c2290d6922bd42e2f2fe9c91a1381959acd3292831
SHA512dbb28281f8fa86d9084a0c3b3cdb6007c68aa038d8c28fe9b69ac0c1be6dc2141ca1b2d6a444821e25ace8e92fb35c37c89f8bce5fee33d6937e48b2759fa8be
-
Filesize
1KB
MD50fbda3024826305d86fc83c7ce128f1b
SHA15a0cdcf11e8e9850ac238b0a56773acecb35964c
SHA256fe78164cdd1ce82e942a53198b0b11ffea34b5db616c3495433c2178e38bda00
SHA512c8e5f4dfd499954fb9a0e13453e3786912cc6b698fe60f06976a7465e00648af2581e4959f53ff398cc7e61c4ace4587c4e61ab7c85133d55c340b8b0e944e5c
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD55cb245567329f29f555af1fdfcc902a4
SHA107a5973ce3c1cc718695ab79a6386797dade4298
SHA2560267cdf7ef9faf0d4d7cf5efeafeac523f65d5f973eb18311958bc425aac5f58
SHA51295865bb8fb66165d85b7c5eed15f3b236412db89413181402be0a6314f775fbdd1f542979213425d5b6bf8ac4582c64f5229685dcac44c2c4df47e3f40bf5bd6
-
Filesize
5KB
MD5b9a370200748f110dd939668c95bbf71
SHA1a49aeeb5878dc5c5dc48cc4d72c25f3e63d41eff
SHA256fa10b9189d40475129db25353f9a3fc55a3e75a9f99218b7aa62a13dd2456ba7
SHA512b9f3f5be49e6968bf70ce8ed3d352524734d70ca9ee80bde14a3533cea2c0062596f1cc945f9c8b77ca826f64fb3553b5db4fa0c3bd1202becaff123cecdfe33
-
Filesize
2KB
MD51f497c78bb1cefe5fae1f2d3e5c467dc
SHA112ec3f79d43fc239252d3812f8f0c2edc492bc51
SHA256e7fedf1f3f9f65c94434b56a0a6b0be4a9773cb80c1fe09b6391adaec9849dbc
SHA512f7ce6b59abe22c099ba4ded438dae24ad228fad07f742fe053c580f2c052a91d5af99bc7616681f0f377f8b5bbbe7ae2defab99203bd1af816724a1e63b62e92
-
Filesize
16KB
MD54319c0e02b7d4d976a1c2d5b42d8b8f5
SHA1169e6fd33d732999fa146e5954bd6260bf0af327
SHA25612d4b34ea2063de4122c0cb2409fe740ce5d829ca861a2d3f3176ddfcb3fcd5b
SHA51272a574a8e19f0ef64e088233b390ec0192d44bd1f19c4a1d863b1d0dab9c7612b42e2468e04fd01b956826d9cd0bffb620b69c633036bc7dd6b66b16d6e4cb51
-
Filesize
270KB
MD576029e0ff90f7a165ee08ff7d6ad98df
SHA16c80b1ceac0481a3640bf44fbe63072392024962
SHA256fb962c24f013e097559ccab487417ceb2cf5921b9f7fbc4c4c6691be4bb1dee7
SHA512a06c9afc5d0e4847bfb49a87f1bdafa6bced2a90d2d6a0b8a4775c4ca0ed6d2dad38f7bb085cfadf7cbacb299849253dfc6ce3c545907315b27cafa1466bc8ea
-
Filesize
7KB
MD5643336d70f3cf53d394fdd90fdeb73d8
SHA1cf23743ba496ff153ba6eaf32fdd5af4f8141136
SHA256abfcc69d14e062d9ec4fb347ac96c2623aa2d78420576079f62af5f6b67d3748
SHA5125270dbfc86c346d8f32998808251143e359045adc4d29144025d6cf69baa31ede85d33920f3d5996da213e21d3ad1bad5ea3d6ef5abf1e894ccf2d407ca2aa9b
-
Filesize
8KB
MD554fcc89e779dc6f32f216c2e227a94b0
SHA1f9b6833e4d0f48b7329fa73507d0af126c03e116
SHA2567b6de54fbcabe990777d03035019b9f3f6c5a9e089d07a9aafcd517cc69a14d0
SHA51267b1748f6dcaf772e51c55b85fe34c5faefdb8c6ae1b5f808a102f0caef58fb5eb462bd9a15a60e7087b299de4ea0185369056df32e2122e84da615ac3bfd5e5
-
Filesize
12KB
MD50576c06f481a8bf186d222fb8467696e
SHA1687df7b9c638718199ef7dcb0fdff9907e433c16
SHA256342d626fa7f61b83d353a3cdb784045f34678b50be58082d0a3ba6d81392177d
SHA512a96c24f809913c37af1cf1523131e99b90340b3a78996a3db6adec4b6b761346d70fb64759f6cbd668e8afc18afa35507e18c68a704dbccb66c1a480088d8aa6
-
Filesize
588KB
MD53cd8a512100996eff9613972922fecaa
SHA122fc71e4b0071f5f4ea80ab5051ad448573f5f7c
SHA256db600a9299ef1e0af7b35f363c16aeb41ed5877a0ca9c02282fd7b361812c1b0
SHA512555637c03bdf39667414cf5d4e3d5f55765178355262448d62e349b01fdc9a9baa53fceedb8ba2c55f4f67ce7d3ff8cda4054abb5710bf53535dcc9b53b03be1
-
Filesize
1.7MB
MD5d0a107a104b3758ea77b0e31f8a571ab
SHA1eaad5a0cb17ce846ada918abcaa3842d90352463
SHA25684a5d54687ac059f3a5643116b03ec8ea8a3ecb94c38b5b271a407b5af96f3e1
SHA5129eeb0216454b88564fbaf26d03b6dd77e3f61d61074f0b4f3f9000258541c7a63602993d5d5d30257308a4ff11b389c4efe3fdf5128aa9e5de3920d2c3002402
-
Filesize
659KB
MD57e3f411c9f6394bc8ab82f163e416240
SHA1e96e81844c37ab873a44b8c77c233820f19f598d
SHA256ab4e564d302c5225f1cdc4473e9d8d32f86ca827f8f231b30893a01f1cf2e1c8
SHA5127ecb5f7d2b6544b0de523bce5ee15d3b6d8278a8f272bc62dfcb1e208b06f3cb40bf4b5544e58cedb51581520acab02a7e2896592606b5c0a34895fba4667653
-
Filesize
1.2MB
MD53ff6d8d840183e8eac463dd99154767d
SHA19a0a2332ddbf89b20775e5610540f50769af37dc
SHA256400d00f515e6db23fc0a365abb98fc5436494d1a450bb4b3339cecb21dbd4d82
SHA512bfe5c985b8b22b746b09e9b6d8ab1b21a904462af4b6e5c78b47f87402e49b2bcffd59c777c6aec58eed1d9ccf583346810053b9fd986a66320ce0354ec00a2f
-
Filesize
578KB
MD54ca2c1ecca437dab4c6595b7195aea11
SHA1095f23df2bbbf441c2623919f100fe54abd9177e
SHA25612d4cb9c9047294d237266bbb1e068a0d3c52ce1374d5134ea6380a5e581625f
SHA5124ca8486a178b2f7cdef8cebc2be19a20da6d79759352a5d122fdcfd73a728924e2654dd5781476951f7a2edfa1932b1b23df38a914a1a63d9875748bbab21af0
-
Filesize
940KB
MD5a28e6199ba4b5a31b14159dab340e8e2
SHA121e89327a4a9bc80d0a3e88cde0ed47b80385e38
SHA256209cc01bec862973131fff631aefb433c8529a60ba6e28585765d46092f275ff
SHA5120057ccd20545a260090818f3bbd9307043c102d5dad1a24467341c039c903161d0587b2a9fdf8ceaf355af4a2fa98d6fc59c6578f7770460e4dff6415f8253c4
-
Filesize
671KB
MD51b7ccce46a4b66e291abed0f49406399
SHA1f66fe1967dc13406d084d688d4cf76c677db3518
SHA256a0c63ab703a3c125aff7378cbfd0dd38263f06d9547e56fd5fc057c749d4cee9
SHA512bf70a4d553946861503d80fa2e3aadddd37dcd4a36643c965c866cfc1e30fb9b12e6200bb0cc2c6b28b614d4866492a074b5fe0e5528a66903682fc7ba39e45f
-
Filesize
1.4MB
MD551638de9b65221abd8b15d335a264c0c
SHA102074a9ce0515990233deafba9c607672c53d00b
SHA2566a494fcae6f5058c1117ac2033e03cf3a5359e02098ca6a5ab7cae1907964a81
SHA5123453a9d65191e54dfc62eb8c051a0e303497f7cd2b464e0cc1f349b828fec5d034a7c6dbeb366647a66e682a6cf7facdc888dee0426c57253fed3340792ed694
-
Filesize
1.8MB
MD5d4c3f3c7b12969401f22942107d577d1
SHA116f3b56febe25288f584de6d127b6540ca3f2084
SHA25657e1cd30f332a56955e7862e22025e0418e5af644ea8d78043d43c4b139c4641
SHA51278849dcdd86bcee79de98988dbed1879b3d8b2d23b7beec3c56bb7a7dbb19f946ef38626a8abbbf151b140c73809a2c263a08e945e27e74089e724e9f63b07c9
-
Filesize
1.4MB
MD5e2a1c9f9e2801ae25ef7b0498aa590e6
SHA19f78eb6b924ed4cdbf484914d32133966789f089
SHA25619d741f0037d9ec31221059be1e45c0ba9a83b53ae2be6d590d56ca5e0eae1b1
SHA512f75a534357acb763ce50f9968a2bfe40ab7504231d49a46f137ac3471b71552575fae2975278cf3e61c474bfb2a627bf8b28a404b333cd888903467f1c90d4b5
-
Filesize
885KB
MD5ae89c962f99a48143de4e348800d913d
SHA169e89854d5e25ededd034ec6834cf3b81fab7f3a
SHA256b0f1714ddf7a87ebcc9afdd3683478be83404a03c5082b9fb10bbd67cfb2223f
SHA5126a670541e37edf1422b97dae90324e5e36b95ba1d66e8f297048febb0e0277e373a9ed1248e3dbcffd3ae5f09e9a7c858cef9ddc60df5a9e36c497354f09c6f7
-
Filesize
2.0MB
MD5c3e85ead4a2722b38ea93b6876d74fff
SHA1cbb141af650579f88d0dbccedadb84213bba3358
SHA25690182376581f1b42f9a465ac3bb17f308f6a291fa280790d70f280609481d6d0
SHA51218c6337b0305fddb95a62f8bb27b9feb0152729de82a3846852166187f9acb76f22bd1815dd752b3ded3aa5a7b6e91b0b9579f85890904e0380cade4c26f08e8
-
Filesize
661KB
MD5d67113316bc9eb9c5ea46a597f96d883
SHA1fe5de26e857284c260a23cfe61d776f4b7c7e66d
SHA25687ca181ab923f15efb55f00ed858fb93522a0cc9be6eaad2ff09bd92b54326e1
SHA5122922b50f4a46f40c6a508930c9dff87ec3489f5ddd899cce4bbaca15caa00e79649a481baa735b702924ee1b30ff5690dd6cd76c0c195c8bc707137407861a12
-
Filesize
712KB
MD50080878bfddc9029642b6b335ff1a2cd
SHA1270ecdb826f44cbe8d44e868800ea429097d6516
SHA25655ba7b7ca40ae7d2f918c1c23ac32fd7d45a7a9f80513dd613c2817ce7a1ccfd
SHA512d2472142a3fbb9906137972f445a5d75a6ea3bc76087645c573b8801dd2b4a889ead5157bb3a94b230ca672a901f91437ac0f729d7d3615b8c4573ab5d77267e
-
Filesize
584KB
MD565ef9fcec0fbab02dd56c2874ad1b552
SHA18f5253a7834cf77e156e6f794f936fd0dc7570a2
SHA256ff174ac134b1ade073a289bd67e8b1bfc3a6f3153ecb651d761847f801af8dbf
SHA512827e3c6a4d4ce3c214b3820430c6a61b9a20d4c90a462180cc599d9501c9c50d87b32e83ac1d586113484072075dda2caad8a0116f5d1079215d845abf9fa2f1
-
Filesize
1.3MB
MD59c71c08a4863510c6cc24d0bdafd894e
SHA18a83f2060aed33b278ab74517c431f836880da61
SHA256971945278641801ad0c3f8a79cdc9c68159a97031e2de7c9142d767dbab2c1ca
SHA512b83e9e754e86f896a8d9472e0b4c789005ed91ddce54c00859fd5d98a2169249be3c9cdbbc1f4fffcf34f5368051f69aa527b109b6e2a6850b9baa93231f9164
-
Filesize
772KB
MD59215369d9e7392d965aef26005d30b00
SHA1fd177611a4368e2cd3a996a170c7c5c6029ce13d
SHA2565715d9c279d900ccad8ed0121e4eaebaaf67b74fe5146659b5640070e4f27fc7
SHA5125247268b295b1cfc14cabccaeb8a4f930947dda3a46bbe61f82299b0d7c15ed80a79b1e96ea8ef0375916168164b78c1dd77c4f79f2d5b045898e77566db4abb
-
Filesize
2.1MB
MD56acd112715e42d45264083c806d8ea48
SHA11844b6a9f6585ff7c36cb33a0696c5d71940f0ea
SHA256e9a8c3d11e5565d5a627b58805a2f9fbf66ccb6ea24b64f59a87ddca06ee0720
SHA512b592513e727828a756aca8bfbda459a4ffdb61d0216de3e8095feb502d7500a3c1c8756b484a01368a8f9bfc5407928732561854400f489d43e7084917b24eaa
-
Filesize
40B
MD5b2c359ffd4bf582baf62f6e8adf87a6e
SHA18e9a26cf9202a00b2f38b9cf92a2cc0fa2e76b79
SHA256ee8fad0e09119ff89b6f13fc18df351e81b41199adfc10acbfeccbbb88e02a9d
SHA5121b1cddd7353d0e9300f1c661feda7f8d1a71e6d90279cb72c3adb51a7bce9c64e2fc87777926db50a8d41cc945445821d1b3cc1628f7446a7c03e64bcf8aff92