Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Resubmissions

19/07/2024, 19:26

240719-x5x16awdjp 10

19/07/2024, 19:22

240719-x3gamawcjq 8

19/07/2024, 19:19

240719-x1lsbszapb 8

19/07/2024, 19:16

240719-xyvx8azajf 7

Analysis

  • max time kernel
    105s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 19:19

General

  • Target

    zeta-updater-1.0.1.exe

  • Size

    3.1MB

  • MD5

    b10ed91a7fe5a422d9c2f9aff5696a19

  • SHA1

    c83105f812109e5f6a26564c197f49d61b2ef403

  • SHA256

    94c0a829b34030f4b279c794962627eb422cd3ce3f969eb8ca330ca0c9f82635

  • SHA512

    fc0d5149ce62ba67755732e5a0004a158bb36ec4e166fcbd734a89c9bde855e71ccf06ee5c7ff9df0834397178c90b9da40769b0275ea487d41c8201f7007c25

  • SSDEEP

    49152:5wSHmvR05JIoEe/avRAvUP5v8R3Lkvrd2o8FEOrJUjnjv/kFE2fSAeFa5J9dxSFw:bOAvsU0D/IE5AeFWxxSFw

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Enumerates connected drives 3 TTPs 20 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\zeta-updater-1.0.1.exe
    "C:\Users\Admin\AppData\Local\Temp\zeta-updater-1.0.1.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2600
    • C:\Users\Admin\AppData\Roaming\zeta\loader.exe
      "C:\Users\Admin\AppData\Roaming\zeta\loader.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2872
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        "powershell" -c ./C:\Users\Admin\AppData\Roaming\zeta
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:544
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2508
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1404
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Roaming\zeta\loader.exe"
      1⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1840
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --profile-directory=Default
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8bac146f8,0x7ff8bac14708,0x7ff8bac14718
        2⤵
          PID:3644
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2012 /prefetch:2
          2⤵
            PID:864
          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2252 /prefetch:3
            2⤵
              PID:5084
            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2704 /prefetch:8
              2⤵
                PID:4072
              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:1
                2⤵
                  PID:3332
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3420 /prefetch:1
                  2⤵
                    PID:4256
                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5080 /prefetch:1
                    2⤵
                      PID:4784
                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4800 /prefetch:1
                      2⤵
                        PID:2616
                      • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                        "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 /prefetch:8
                        2⤵
                          PID:4184
                        • C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
                          "C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4576 /prefetch:8
                          2⤵
                            PID:628
                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3536 /prefetch:1
                            2⤵
                              PID:1820
                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4772 /prefetch:1
                              2⤵
                                PID:4160
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5568 /prefetch:1
                                2⤵
                                  PID:4816
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2420 /prefetch:2
                                  2⤵
                                    PID:4832
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2440 /prefetch:2
                                    2⤵
                                      PID:4988
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2424 /prefetch:2
                                      2⤵
                                        PID:2300
                                      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=3708 /prefetch:2
                                        2⤵
                                          PID:1256
                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2280 /prefetch:2
                                          2⤵
                                            PID:864
                                          • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                            "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5724 /prefetch:2
                                            2⤵
                                              PID:512
                                            • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                              "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=1996 /prefetch:2
                                              2⤵
                                                PID:4412
                                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2004,15369073110600638353,5602695354514035927,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=5964 /prefetch:2
                                                2⤵
                                                  PID:3624
                                              • C:\Windows\System32\CompPkgSrv.exe
                                                C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                1⤵
                                                  PID:4120
                                                • C:\Windows\System32\CompPkgSrv.exe
                                                  C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                  1⤵
                                                    PID:884
                                                  • C:\Windows\system32\sihost.exe
                                                    sihost.exe
                                                    1⤵
                                                      PID:1508
                                                    • C:\Windows\system32\sihost.exe
                                                      sihost.exe
                                                      1⤵
                                                        PID:4564
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe /LOADSAVEDWINDOWS
                                                          2⤵
                                                          • Boot or Logon Autostart Execution: Active Setup
                                                          • Enumerates connected drives
                                                          • Checks SCSI registry key(s)
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:3284
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:3448
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:5064
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:544
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:916
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4668
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        • Suspicious use of AdjustPrivilegeToken
                                                        PID:4020
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        PID:2988
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Checks SCSI registry key(s)
                                                        • Modifies registry class
                                                        PID:2044
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Enumerates connected drives
                                                        • Modifies registry class
                                                        PID:4128
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:1868
                                                        • C:\Windows\explorer.exe
                                                          explorer.exe
                                                          1⤵
                                                            PID:2756
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:1748
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:4128
                                                              • C:\Windows\explorer.exe
                                                                explorer.exe
                                                                1⤵
                                                                  PID:4136
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:4120
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:2480
                                                                    • C:\Windows\explorer.exe
                                                                      explorer.exe
                                                                      1⤵
                                                                        PID:3908
                                                                      • C:\Windows\system32\sihost.exe
                                                                        sihost.exe
                                                                        1⤵
                                                                          PID:1972
                                                                        • C:\Windows\system32\sihost.exe
                                                                          sihost.exe
                                                                          1⤵
                                                                            PID:1748
                                                                          • C:\Windows\system32\sihost.exe
                                                                            sihost.exe
                                                                            1⤵
                                                                              PID:1304

                                                                            Network

                                                                            MITRE ATT&CK Enterprise v15

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                              Filesize

                                                                              418B

                                                                              MD5

                                                                              eed4949c9405e34cda7281bfe0a64670

                                                                              SHA1

                                                                              c22f16a0dae4fdf8d20b7fc83309a69d21e33ceb

                                                                              SHA256

                                                                              11a16adf1d0a523b12eaa7f5fe85714b563e8fd0d39e474366be2010a88484ba

                                                                              SHA512

                                                                              8c1b389311f8cc8f0341b2915da346709594238b82135df46f47b974f69845d5382302c0688155eae2825730b017a4ac6d48dc8787241898a01b7bb08a0448e8

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\metadata

                                                                              Filesize

                                                                              954B

                                                                              MD5

                                                                              0f2dabfef3902e9d0121cbb4cae26e8e

                                                                              SHA1

                                                                              ad59e26d1cf92961bd406726161acebe150b5300

                                                                              SHA256

                                                                              53160bff15ef070d6e1f3917c363ed157182baa6c6b131c678a1f2c411c64220

                                                                              SHA512

                                                                              4e9b93ef5e352ecc93ce4339452d8263d4092ce999a8c2619362507b36f7565c709464eaf7d9a129196aac4d095aca7aff1ced22163c73263b77e673bc83fc39

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\1ff5a745-f5c8-4baa-bc55-d0850c647ab0.dmp

                                                                              Filesize

                                                                              900KB

                                                                              MD5

                                                                              ac901417bbd0274cb59face7fffe7d47

                                                                              SHA1

                                                                              9ab7341db1e79d3b484aa84199dbecdae779b972

                                                                              SHA256

                                                                              bdc93b3c87f6b2f42ee710783d786482a038257e93a206074f2275bc434e18df

                                                                              SHA512

                                                                              3ee867ebdf1521d63ec9cc3da0378d9908257799da45a3858666a478c92e471b796c09a4fcc68a2335736123e426b8b79187dba0650871708e250e6fe09d9e73

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\2bb8865e-e3b4-41f2-92d2-273dd4ab7aa6.dmp

                                                                              Filesize

                                                                              892KB

                                                                              MD5

                                                                              e02780178116c983bcc8adfa6d003503

                                                                              SHA1

                                                                              168987af0ef14e57eda0da65c24ae73d7de96043

                                                                              SHA256

                                                                              8ca6fbf4f34d12691bb00e55e1f280088b81a5e011e85ad74f4b329358b755da

                                                                              SHA512

                                                                              0e6a47c2a110297fd5b8f308534b3a0de75ecea7f1db4bf7eac583769be476ba3b40f64b17f0b0f11f3814da23cc1766daa7e860c23e5fa07653641a18d29f56

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\3e174a3f-0843-4bb8-9bbd-0fe2cb643053.dmp

                                                                              Filesize

                                                                              900KB

                                                                              MD5

                                                                              9f6d5ebb96151ae432a1008ddbd3214d

                                                                              SHA1

                                                                              35b53b66bed81802fa97451148c93f82c48f205d

                                                                              SHA256

                                                                              b3c001c7bb033ece06dfc819bde332bab4d6191fa49a31f0fb72e43f7ccb2c16

                                                                              SHA512

                                                                              9d0ab559bf5d99448142cb6fa859c40e9d1fa9c0dca60fba6024796c5696e98dbbf66e8bdaa409c7fa0bc29a59cec928be76ea6a89389030be42ab73a5831f7f

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\42f703cf-d1a5-4c17-a58b-c89a53512c94.dmp

                                                                              Filesize

                                                                              892KB

                                                                              MD5

                                                                              1692ccee6ebfbf2d9aace488ea642fad

                                                                              SHA1

                                                                              ab90a0105a9187ba8321253e3e7c01f29dc354a3

                                                                              SHA256

                                                                              b26a2c28a0e86669a869c2bf5627bec0890c1709b23dcd9a2c19f4dea94dbe8c

                                                                              SHA512

                                                                              96b1305051980ed1b29de873d1307802dbee1720bcdeb8df220411e9d38c71e6d18960ab2cb83c26c269aa47995021e9c9af8306261e488181c55f0dfb1bbf12

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\7aed2ab2-3327-46ea-88b6-e9c9ef5745a2.dmp

                                                                              Filesize

                                                                              900KB

                                                                              MD5

                                                                              afba93515e2b13b0ae4037ceb2abe1ab

                                                                              SHA1

                                                                              2724251e3732fe65bad480a9bfcafafe0b0455da

                                                                              SHA256

                                                                              4f98029332e8e8171b566157ad3a00f6ffcac066b645178f318723d3d1fef059

                                                                              SHA512

                                                                              4dfd1e3d59507c35f7080b1eaf3aedfa53a6f5e1c7e992536bcbb7f171062273c0bd7553b3e1a8c92f339931f916cc594d56fd89f68cf3f65ada0ff9b707bdf1

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\960b662d-1c1c-4eb0-b0d8-37c08469a906.dmp

                                                                              Filesize

                                                                              892KB

                                                                              MD5

                                                                              ac752b451db8a3ec56ee0ac7870af674

                                                                              SHA1

                                                                              54e80c063d55d571d0def42855fc64fc1d7c7b3b

                                                                              SHA256

                                                                              6dcb007e7fb1223611c1343cd2e991d41ec9fc9d21f17e2b9f22f41b59e9237d

                                                                              SHA512

                                                                              82643f7c04b51884a3b9da00b637a80a39ab3897f1379e9f35658a68f4126dec6b791d762e199f55fd43653865641bc0e47120be602ffc42197d269f6a9f9072

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\9b275769-2de2-474a-b428-06b2d54f47b3.dmp

                                                                              Filesize

                                                                              6.0MB

                                                                              MD5

                                                                              000cd5bd4d2c6665126dafb6b36f986d

                                                                              SHA1

                                                                              006b06da63cc28c798f789ff226e95c51022ae2c

                                                                              SHA256

                                                                              168e96b0074a6849c98232452964bf65899c4748b3c4d499cd772cadc9140a4c

                                                                              SHA512

                                                                              2c3fb2647d7154d06acc5c05df0751815657b06b4d1154d6796f0b25afad768f13746dcae77873ebeb27112ea14114ef56a8c1234f23ad5c45a8a3e6289e01b2

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\a78039d4-7255-4634-a606-bebe1941c538.dmp

                                                                              Filesize

                                                                              892KB

                                                                              MD5

                                                                              aa2739c10a2c1484d075d905295dd34e

                                                                              SHA1

                                                                              10e3ebcabc86f9ad3bee4f0c85699179189bfe24

                                                                              SHA256

                                                                              c0392ec938d8d6a796a8b0ffab04b88e126b53b05c0219d856b0b0d09f65cea6

                                                                              SHA512

                                                                              cb1d761eb5953d5181cab20e64a6a49a6c268f6519d15f79eef0d95e1b0b84ba308135bb7fdad3871aba40a02583714600639b631fc26e70a23640f0349c591a

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\b5f58582-b27e-420c-a93d-df5b4227b1a8.dmp

                                                                              Filesize

                                                                              892KB

                                                                              MD5

                                                                              c5108a4a8bab0250a2c9197445a7f7e6

                                                                              SHA1

                                                                              bbd3bba54ee93a3e73d69d89457b76c4f20b5a6f

                                                                              SHA256

                                                                              0a26005fa4be6a82d4d6b055b5879390401c1600b1ae70e60219529183c1a813

                                                                              SHA512

                                                                              81bcbf6cae89436e519eb6a946b46c86fd6e453934ad0bebe4b03b9ebb93c77b5683497f503a96d00f31b1d73e5c8d086f290527c8f72449ea9a482526dfe6a5

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              561de06bc703372142d3661d2a4d76d1

                                                                              SHA1

                                                                              4c1cbd1e539174eef286afbc9c46e8d0d0497a37

                                                                              SHA256

                                                                              af4d3f8b412e702e00cd145a2c4afb6905319630fbfac09f19b1245276866e74

                                                                              SHA512

                                                                              e2efcf1c62877320bbb65968f62d7eabe9813d49971ba1cf50f6690a82543909ac1bbebf78be4be18423dfaeda93e0d5deef10da4d45bd8ddd9a7ca44b2ff1f5

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              5a8ea2426e2eb4c51bb6b2231d2e5256

                                                                              SHA1

                                                                              22b89c25d965f91e578049320d223d9bfc949ebd

                                                                              SHA256

                                                                              6c32138c6fd4995ed5048b9a963888d5f821acedf5b0a2d72b336fb409e2c345

                                                                              SHA512

                                                                              ad9a7e16774a267fee89fb6b654ab26408106c1202b3b4416ff161df7df8cf18f46fc0d4db275e3f3d372c825d7b5df89701132e5f3e27fb8cb894b6947812dc

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              02336ad37ca4dc668d663c5b13cddaa2

                                                                              SHA1

                                                                              907f28ba9e252b285f7f3a046cad60f984ca0acf

                                                                              SHA256

                                                                              dc058cb9fdf8d4f01c54a1329d1fee5312fb72ac01264f457987dd371ba9467c

                                                                              SHA512

                                                                              43206e3a1b43f31ede510dac984ffa31266de96313998b57642b8c4f9f16a882b658d6a5aeeb9d17484a00232f3fa464a657eac303a7cb507a4b5c693f0adfaa

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              54aadd2d8ec66e446f1edb466b99ba8d

                                                                              SHA1

                                                                              a94f02b035dc918d8d9a46e6886413f15be5bff0

                                                                              SHA256

                                                                              1971045943002ef01930add9ba1a96a92ddc10d6c581ce29e33c38c2120b130e

                                                                              SHA512

                                                                              7e077f903463da60b5587aed4f5352060df400ebda713b602b88c15cb2f91076531ea07546a9352df772656065e0bf27bd285905a60f036a5c5951076d35e994

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              2f842025e22e522658c640cfc7edc529

                                                                              SHA1

                                                                              4c2b24b02709acdd159f1b9bbeb396e52af27033

                                                                              SHA256

                                                                              1191573f2a7c12f0b9b8460e06dc36ca5386305eb8c883ebbbc8eb15f4d8e23e

                                                                              SHA512

                                                                              6e4393fd43984722229020ef662fc5981f253de31f13f30fadd6660bbc9ededcbfd163f132f6adaf42d435873322a5d0d3eea60060cf0e7f2e256262632c5d05

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                                                                              Filesize

                                                                              152B

                                                                              MD5

                                                                              dfc7ff47b07e18f67ccfb4f60a49dd8a

                                                                              SHA1

                                                                              0b8b50df256b14a01bb52bbb688d4b51cb20669a

                                                                              SHA256

                                                                              9b8e5770ae19435d8e1fa2d5814f0cadda96d9207b598a90009c357f7d4d9518

                                                                              SHA512

                                                                              163f50f099deb53b7723d3c629e39bd08b20c0c28fa2d75edf923babdc106e3c16fe25a7b193f27b738ec9ff8bbd6b5295cfb66af399e2bf7b0851a108578004

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              5KB

                                                                              MD5

                                                                              5a4f9d8b60754f97cf3ea1c26535f422

                                                                              SHA1

                                                                              04cdfd74ad9ea8da5c629dbd212a967159e32eb2

                                                                              SHA256

                                                                              5dcdd5843fef8762505fc027b234ad0ba6c9ebeaa15dfae7ff1f1b06510f0ac0

                                                                              SHA512

                                                                              753154eda132a43a78cb58c19a79ae718c81776c87cad697d2a0bce6f1b75722e19c479105fa6235a9b788634e38da5522fb9f02d1c7b7693a5d023aee75bf20

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                                                                              Filesize

                                                                              6KB

                                                                              MD5

                                                                              55ec42e8b249b2f7d856049bc9b482dd

                                                                              SHA1

                                                                              ae6bfe2efdfed3aca8fd78de1dea6bdcbb681d5f

                                                                              SHA256

                                                                              d26874baee78533d28536eae150539b9682b11d9a56a151d334ea61e00eea5fa

                                                                              SHA512

                                                                              72059a646d4a9ebe311bf43f83e6058375d3201bc95f22565341aae7c28c576f8a61df726e4820ae5998fbc92a395e2c9209e4792954b4b0f7d18207437a34df

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT

                                                                              Filesize

                                                                              16B

                                                                              MD5

                                                                              6752a1d65b201c13b62ea44016eb221f

                                                                              SHA1

                                                                              58ecf154d01a62233ed7fb494ace3c3d4ffce08b

                                                                              SHA256

                                                                              0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd

                                                                              SHA512

                                                                              9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              6bfe2942c6d4adc29d69919b181928d2

                                                                              SHA1

                                                                              7fccc8be034f7fa3fcc7fe85ee095fdf8ef17f1d

                                                                              SHA256

                                                                              2895670d52a215bfed01a28c587a82c60e2f072c68be1a8a2912784e3c429b81

                                                                              SHA512

                                                                              2683d1282db0ce518469b4031b22923f8a31681bbbbdea5ba45010a4eb6b222e4271811a3d5e7e8b2f82162167358e500de9b549c858f553e0e2d5932855fa9f

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State

                                                                              Filesize

                                                                              11KB

                                                                              MD5

                                                                              cd0d05fdac8ae43c63c7d722c68b0a22

                                                                              SHA1

                                                                              7b4e860a4996dbfaf182224bdea9cb86d170a266

                                                                              SHA256

                                                                              9490a57a6418682a695ea5da91ec6c78b837d9840d8fee4192d0dccf8383e999

                                                                              SHA512

                                                                              3caf6e16370bc91c921d8da18cee1a9b42a003773733b896373d70237551df731f9741817e7f1b4c123804e99cd878ec183121e113f3e2bfe599481498f80d28

                                                                            • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache\data_1

                                                                              Filesize

                                                                              264KB

                                                                              MD5

                                                                              1221d926bf8090c3d1239c0afa5b2702

                                                                              SHA1

                                                                              dd7437aff0a5ecff1529a5d7abb458456b888d3f

                                                                              SHA256

                                                                              ef8fc650812fac335b8404ce7b1153c23c7f0ed91a90c1758fcd3dd550e3cd82

                                                                              SHA512

                                                                              be9079d9a8d84fb4dcd227abf3baffa13992baecb72b28e52c8ed39e2144069367764c17c358b16c01824432150ef7d4404538b98c7531e0484ca2dfdeb34919

                                                                            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_pphfio5e.gin.ps1

                                                                              Filesize

                                                                              60B

                                                                              MD5

                                                                              d17fe0a3f47be24a6453e9ef58c94641

                                                                              SHA1

                                                                              6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                              SHA256

                                                                              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                              SHA512

                                                                              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                            • C:\Users\Admin\AppData\Roaming\zeta\loader.exe

                                                                              Filesize

                                                                              4.1MB

                                                                              MD5

                                                                              ab2242c4aba7518eecc26620cbd1d4aa

                                                                              SHA1

                                                                              ba46c9820732a289cd30a25bfcfc1b3492a6dee1

                                                                              SHA256

                                                                              b593c2f3d90d0205c1c465d8295514f8e1ec4df4acb3b45c844c72a9529e46f8

                                                                              SHA512

                                                                              6c3f80b5e6628481a9cbb7c14e020c46c6d4ebb2bcabc5701035c47417000631e6d6c8b3650e0a60e6ad6d1a8e36d75c81e6b36c2539f522aa7cc72eec678472

                                                                            • memory/544-16-0x00007FF8BB750000-0x00007FF8BC211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/544-19-0x00007FF8BB750000-0x00007FF8BC211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/544-4-0x00007FF8BB753000-0x00007FF8BB755000-memory.dmp

                                                                              Filesize

                                                                              8KB

                                                                            • memory/544-7-0x000001AAF7230000-0x000001AAF7252000-memory.dmp

                                                                              Filesize

                                                                              136KB

                                                                            • memory/544-15-0x00007FF8BB750000-0x00007FF8BC211000-memory.dmp

                                                                              Filesize

                                                                              10.8MB

                                                                            • memory/2508-23-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-22-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-28-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-21-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-31-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-29-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-32-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-33-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-27-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB

                                                                            • memory/2508-30-0x000001FA0FFB0000-0x000001FA0FFB1000-memory.dmp

                                                                              Filesize

                                                                              4KB