Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
45s -
max time network
24s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
08/08/2024, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
HTTPDebuggerPro.msi
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
HTTPDebuggerPro.msi
Resource
win11-20240802-en
General
-
Target
HTTPDebuggerPro.msi
-
Size
10.4MB
-
MD5
da7e08ef168ee4662ff1878202303a36
-
SHA1
df3bc617162a0f5f5e854403f5dc1e00e093e498
-
SHA256
ed9e8f5fda10a14fbce76252b111a031bc4f3351e9eb342ea4edf6b6d16add69
-
SHA512
bd248c68077a6aa1d6120cd3401770b09762cd75010a30b40cdd46196c726bce2fffa9036a2e3f47bbdbe4b935b9252c7ea38f4947d5ef187831d274a13b8974
-
SSDEEP
196608:I0juQ6vXkAs3lJiZvWFsd0EMdPfR9kngqVepxvwyd+wNQ3jOPw8pJN6sR:I0jT6vXj2I+FifM5Bqcvvu3jgJN6sR
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\system32\drivers\HttpDebuggerSdk.sys HTTPDebuggerSvc.exe File opened for modification C:\Windows\system32\drivers\HttpDebuggerSdk.sys HTTPDebuggerSvc.exe -
Blocklisted process makes network request 4 IoCs
flow pid Process 2 4808 msiexec.exe 3 4808 msiexec.exe 4 4808 msiexec.exe 5 4808 msiexec.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File created C:\Program Files (x86)\HTTPDebuggerPro\nss\sqlite3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\freebl3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win8\HttpDebuggerSdk64.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nssckbi.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\zlib_license.txt msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\Styles\Office2016.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\libnspr4.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\libplc4.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\libplds4.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nssutil3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win7\HttpDebuggerSdk64.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\scintilla_license.txt msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerBrowser.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\license.rtf msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win8\HttpDebuggerSdk32.sys msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nss3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\nssdbm3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\smime3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\certutil.exe msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerUI.exe msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\cximagecrt.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\nss\softokn3.dll msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe msiexec.exe File created C:\Program Files (x86)\HTTPDebuggerPro\drv\Win7\HttpDebuggerSdk32.sys msiexec.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File created C:\Windows\Installer\e57e60a.msi msiexec.exe File created C:\Windows\SystemTemp\~DFBF7CB5D9AC4FD723.TMP msiexec.exe File opened for modification C:\Windows\Installer\e57e60a.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\MSIE6D6.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\SystemTemp\~DFF900CBE20B609821.TMP msiexec.exe File created C:\Windows\SystemTemp\~DF0AF92F4932A56091.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIE7A2.tmp msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{3AAA8F78-6858-4344-8675-C73E1573CA0F} msiexec.exe File created C:\Windows\Installer\{3AAA8F78-6858-4344-8675-C73E1573CA0F}\HTTPDebuggerUI.exe msiexec.exe File opened for modification C:\Windows\Installer\{3AAA8F78-6858-4344-8675-C73E1573CA0F}\HTTPDebuggerUI.exe msiexec.exe File created C:\Windows\Installer\e57e60c.msi msiexec.exe File created C:\Windows\SystemTemp\~DFBF4A40A2DC30D805.TMP msiexec.exe -
Executes dropped EXE 3 IoCs
pid Process 2976 HTTPDebuggerSvc.exe 4196 HTTPDebuggerSvc.exe 420 HTTPDebuggerUI.exe -
Loads dropped DLL 10 IoCs
pid Process 2344 MsiExec.exe 2344 MsiExec.exe 2344 MsiExec.exe 2996 MsiExec.exe 3528 MsiExec.exe 2344 MsiExec.exe 2344 MsiExec.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 4808 msiexec.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HTTPDebuggerSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HTTPDebuggerSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language HTTPDebuggerUI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies data under HKEY_USERS 7 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root HTTPDebuggerSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates HTTPDebuggerSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs HTTPDebuggerSvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs HTTPDebuggerSvc.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ProxyStubClsid32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ProxyStubClsid32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\TypeLib\ = "{33658027-1004-4E1E-8D35-C9146DF87919}" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\Version = "151781376" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\DeploymentFlags = "3" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\Version MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\87F8AAA38586443468577CE35137ACF0 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB\ = "vbWB Class" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB\CLSID MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\VersionIndependentProgID MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\Control MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\MiscStatus\1\ = "131473" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\EFA6D6B88BD56724E9FE0AB5852CEEED msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\ProductName = "HTTPDebuggerPro" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\ToolboxBitmap32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\FLAGS\ = "0" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\0\win32\ = "C:\\Program Files (x86)\\HTTPDebuggerPro\\HTTPDebuggerBrowser.dll" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ = "IvbWB" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB.1 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB\CLSID\ = "{20247C83-3429-47B1-817F-C99F29D2BF3A}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\ = "vbWB Class" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\ = "vbMHWB 1.0 Type Library" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\HTTPDebuggerPro" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\ProgID MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\Version\ = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\0 MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Media\1 = ";" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\Language = "1033" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\Insertable MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib\Version = "1.0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32 MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\TypeLib MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\VbMHWB.vbWB\CurVer\ = "VbMHWB.vbWB.1" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\InprocServer32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ = "IvbWB" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\InstanceType = "0" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\MiscStatus\ = "0" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{33658027-1004-4E1E-8D35-C9146DF87919}\1.0\0\win32 MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{6E73D516-7CDC-435E-8A8D-86E0AE4D5E08}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\ProductIcon = "C:\\Windows\\Installer\\{3AAA8F78-6858-4344-8675-C73E1573CA0F}\\HTTPDebuggerUI.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20247C83-3429-47B1-817F-C99F29D2BF3A}\MiscStatus MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\ = "_IvbWBEvents" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A8096483-2E53-45CF-A0E5-4E17CED6B7EF}\TypeLib\ = "{33658027-1004-4E1E-8D35-C9146DF87919}" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\87F8AAA38586443468577CE35137ACF0 msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 564 msiexec.exe 564 msiexec.exe -
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 680 Process not Found 680 Process not Found 680 Process not Found 680 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeShutdownPrivilege 4808 msiexec.exe Token: SeIncreaseQuotaPrivilege 4808 msiexec.exe Token: SeSecurityPrivilege 564 msiexec.exe Token: SeCreateTokenPrivilege 4808 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4808 msiexec.exe Token: SeLockMemoryPrivilege 4808 msiexec.exe Token: SeIncreaseQuotaPrivilege 4808 msiexec.exe Token: SeMachineAccountPrivilege 4808 msiexec.exe Token: SeTcbPrivilege 4808 msiexec.exe Token: SeSecurityPrivilege 4808 msiexec.exe Token: SeTakeOwnershipPrivilege 4808 msiexec.exe Token: SeLoadDriverPrivilege 4808 msiexec.exe Token: SeSystemProfilePrivilege 4808 msiexec.exe Token: SeSystemtimePrivilege 4808 msiexec.exe Token: SeProfSingleProcessPrivilege 4808 msiexec.exe Token: SeIncBasePriorityPrivilege 4808 msiexec.exe Token: SeCreatePagefilePrivilege 4808 msiexec.exe Token: SeCreatePermanentPrivilege 4808 msiexec.exe Token: SeBackupPrivilege 4808 msiexec.exe Token: SeRestorePrivilege 4808 msiexec.exe Token: SeShutdownPrivilege 4808 msiexec.exe Token: SeDebugPrivilege 4808 msiexec.exe Token: SeAuditPrivilege 4808 msiexec.exe Token: SeSystemEnvironmentPrivilege 4808 msiexec.exe Token: SeChangeNotifyPrivilege 4808 msiexec.exe Token: SeRemoteShutdownPrivilege 4808 msiexec.exe Token: SeUndockPrivilege 4808 msiexec.exe Token: SeSyncAgentPrivilege 4808 msiexec.exe Token: SeEnableDelegationPrivilege 4808 msiexec.exe Token: SeManageVolumePrivilege 4808 msiexec.exe Token: SeImpersonatePrivilege 4808 msiexec.exe Token: SeCreateGlobalPrivilege 4808 msiexec.exe Token: SeCreateTokenPrivilege 4808 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4808 msiexec.exe Token: SeLockMemoryPrivilege 4808 msiexec.exe Token: SeIncreaseQuotaPrivilege 4808 msiexec.exe Token: SeMachineAccountPrivilege 4808 msiexec.exe Token: SeTcbPrivilege 4808 msiexec.exe Token: SeSecurityPrivilege 4808 msiexec.exe Token: SeTakeOwnershipPrivilege 4808 msiexec.exe Token: SeLoadDriverPrivilege 4808 msiexec.exe Token: SeSystemProfilePrivilege 4808 msiexec.exe Token: SeSystemtimePrivilege 4808 msiexec.exe Token: SeProfSingleProcessPrivilege 4808 msiexec.exe Token: SeIncBasePriorityPrivilege 4808 msiexec.exe Token: SeCreatePagefilePrivilege 4808 msiexec.exe Token: SeCreatePermanentPrivilege 4808 msiexec.exe Token: SeBackupPrivilege 4808 msiexec.exe Token: SeRestorePrivilege 4808 msiexec.exe Token: SeShutdownPrivilege 4808 msiexec.exe Token: SeDebugPrivilege 4808 msiexec.exe Token: SeAuditPrivilege 4808 msiexec.exe Token: SeSystemEnvironmentPrivilege 4808 msiexec.exe Token: SeChangeNotifyPrivilege 4808 msiexec.exe Token: SeRemoteShutdownPrivilege 4808 msiexec.exe Token: SeUndockPrivilege 4808 msiexec.exe Token: SeSyncAgentPrivilege 4808 msiexec.exe Token: SeEnableDelegationPrivilege 4808 msiexec.exe Token: SeManageVolumePrivilege 4808 msiexec.exe Token: SeImpersonatePrivilege 4808 msiexec.exe Token: SeCreateGlobalPrivilege 4808 msiexec.exe Token: SeCreateTokenPrivilege 4808 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 4808 msiexec.exe Token: SeLockMemoryPrivilege 4808 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4808 msiexec.exe 4808 msiexec.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe 420 HTTPDebuggerUI.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 564 wrote to memory of 2344 564 msiexec.exe 81 PID 564 wrote to memory of 2344 564 msiexec.exe 81 PID 564 wrote to memory of 2344 564 msiexec.exe 81 PID 564 wrote to memory of 2152 564 msiexec.exe 85 PID 564 wrote to memory of 2152 564 msiexec.exe 85 PID 564 wrote to memory of 2996 564 msiexec.exe 87 PID 564 wrote to memory of 2996 564 msiexec.exe 87 PID 564 wrote to memory of 2996 564 msiexec.exe 87 PID 564 wrote to memory of 3528 564 msiexec.exe 88 PID 564 wrote to memory of 3528 564 msiexec.exe 88 PID 564 wrote to memory of 3528 564 msiexec.exe 88 PID 564 wrote to memory of 4196 564 msiexec.exe 91 PID 564 wrote to memory of 4196 564 msiexec.exe 91 PID 564 wrote to memory of 4196 564 msiexec.exe 91 PID 2344 wrote to memory of 420 2344 MsiExec.exe 92 PID 2344 wrote to memory of 420 2344 MsiExec.exe 92 PID 2344 wrote to memory of 420 2344 MsiExec.exe 92 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\HTTPDebuggerPro.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4808
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding DC3AEE1DF55A21568726D2738EFD5CAA C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerUI.exe"C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerUI.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:420
-
-
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:2152
-
-
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding A3FBBA32E0DF05B95E7330CFC2D071D52⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Windows\syswow64\MsiExec.exe"C:\Windows\syswow64\MsiExec.exe" /Y "C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerBrowser.dll"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3528
-
-
C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe"C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe" /install2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4196
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:4732
-
C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe"C:\Program Files (x86)\HTTPDebuggerPro\HTTPDebuggerSvc.exe"1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
PID:2976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13KB
MD5cb00ca4a47752348f2ef239beb870028
SHA140cc28a3ff90405701e31bd9af8a2f93f26c6976
SHA256a47c14e0ca557e1c488c5083612c4e825a455d92e1c5d8adc12910d8b26d56af
SHA51210b15ad383d92ab81582920f5b4c5a6a5c1fdfb461548a01fb32c309822cfc662210f102ef4f7d6e4238aa21d0df143b34167a8474659d69e3584ba29ca225c1
-
Filesize
575KB
MD54facbaab17f633d153a7b53fb483b22f
SHA19e0e7bfbe927b1a77133380a2f76531b9416962a
SHA256c557b766a00fd4ba6950c08c6133c20e4dd800139a19d271d46d6feb31ebf870
SHA51286cccef12998201c28c257204cdcfdd339ac5e65c5d6627ffa6e5d88f57bdd94812dd7f657bbd3b01b88679abe92343496be775f2d7ac1f3d59573a0b696d832
-
Filesize
1.5MB
MD55b3c641fd1b48108810cc12b1971ffc2
SHA10d38bdd2d0654391b4737db591f2f1e19a9d8a3f
SHA256f6c8009319b95d3d94c8858d831563b2568f98dda478b6a784ba5a828374e7fb
SHA5124c2888ad3632bcb9efe06fc15c65c7a0ff9f5382e272ff7402f00a701a8aa3a4d9e467630085dc47fb9735ded898e995af1e6259472f0f4954d77b55f2f8944a
-
Filesize
8.1MB
MD5d6ab0e25b4f76ca11acb71eb290938d5
SHA10269f40ec4936edf9eed2b1065a631dd895776e4
SHA256555b66eabf40ca228d6a285862e622b662a528ffb68aa01a3bb27b4132188de0
SHA5125417a45ef64accfc7fc5b282c089b2046677f74249436ab4112ff5626cd6ffe5e9524012f093faf13eb108199a0c281ed5f5f7feef6a7db38ed1408d10e6039d
-
Filesize
3.9MB
MD5591dde57b17d9fcbdbc892cf1a7d3610
SHA11c2c32d101010165c471c6d5b01ef67c3224f6ff
SHA2567d7d55ab604078e69070e2d162d77ee286e2faf748a52401a64f79824cb3b59d
SHA512fc4bb5858a2b568c344a9b419176ed6e239e468c4eec9e76eba5a35c8bc97b5947bf1f7055544c5fd5b4d67d11e1ade5496057168b0fcf53afffc4595fb67bc6
-
Filesize
1023KB
MD5a2fe19b6b766a12017c8be442ad0cef2
SHA19e5bed747e57e7c7141fabe3d9cb12c863d4b2f5
SHA25635b71d192854edc95248f77deb824f034e903447319459aaf454269650fd51d3
SHA5129969acf85432029810cd1eb2f7a65a3bc19d603749ecdcd2301645ad342bfc29d977c067a081a395afea4f9a5d199c982c4374d2fe6a2cedd9ff659af2101c7e
-
Filesize
97KB
MD5947c624c4bd48f8c66fcd00fc0f947d4
SHA15266036308e0d0eb837cc3126dba5a0b6ec270fc
SHA2562e89606775ed719b9d950ae9d37e819a2567426fbe5c3e0aad8d86fec693b67b
SHA5122fd940253eb2c4f9da9ceb9516b811f28bd8187fb3d819a86f0ec37f98c30d0a9b510652b0f615fe15cdcec1bfeff435da7b42407bb29faf2b1d58ce13508fc6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize765B
MD501065a09c71d25c6c7602f826b45f3da
SHA14fb03bf1ca148a3717c108f00b40a7a9456a0216
SHA256ad27a1045d9cf5a5fbf5dd3257c22eba09b13acfe3e59e9785e76fac904bdbb5
SHA512fe5ca37a416965b28573cf7cba1d37aabee715c8d0f00fe4345191471c27f7831134be20e5dfa662005e2ed53c69052cdba812a82752684fa1dbc8655564a384
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\AEACCDA8653DD8D7B2EA32F21D15D44F_76733C28E3E87E78CF09C0BB924E316A
Filesize638B
MD58a024a9e772de6cd991ee0ec49f70d87
SHA1bcafcecf42175dd2f70f89e68d8fb42f8da6b10e
SHA2569291d3ed7d1436ced91df4373b9cc1accc02f869d1bed24780f0ff8e8017659a
SHA5128a1a5bb139dd94280024ed32478049230c3d92a342c070985cbcf7c7a061d2c6491a01fc370f2a31367200f2bd3be1ca575fb5605cc06a3e3b6d6811c5655285
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize1KB
MD5c118ce3b46def8ae281049aa1bdce687
SHA103a2ddd41d9cf5637f388970d995eefaf6e2b2a2
SHA256f480be175b0c2b894f609dbf9d4defc789dd56bb81673d7168bb97e91396cf71
SHA51251279b72b2f38950239218972fdd7549e9bc66325bf0aebb85feec909a01dafa2cf9c5ce789eaa9fbaf979b5f4a77899d41eafe4cd7166ec8d05bbf5c4fe73d3
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\18E6B4A57A6BC7EC9B861CDF2D6D0D02_C3B142D2C5374581DC2FDFFDEDBDEDDB
Filesize484B
MD5d685ee3b2a9e2c9f4e7f7b65032e920c
SHA1f30ee0720a78b92cd4b7276ef2c12937f043482e
SHA256a7c72f1649fce848cb345a7b83f8e9b2c60ff5ad5d5090993f9e94d629f604f4
SHA51202abd113f7077e2a0a61b23029c48544fbdef0383f6c6c887482b98bec361e50a394deee88bb9d8b15256da464a8d25a20acd49b899ab6dd4efa72dae433bf7e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\AEACCDA8653DD8D7B2EA32F21D15D44F_76733C28E3E87E78CF09C0BB924E316A
Filesize496B
MD59d886d02d66d788f63deb608220acf18
SHA1b152198c787ac2c8f4a48c0a8b9dc507a191ae88
SHA2567e8f4374f10aca18fca32d159f58cdbd1bd5e86711ff886bf9d3f0eee4d7f270
SHA512699be013a978d1feb86c48a66ab0deb9402b08c7894ee5f6473e0fa74ff98b28284482e04c9effafe04932af029ea6cfa14f3539b9f54b6706758cd0a478d50e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_93702E680A5530C052C8D2BA33A2225F
Filesize482B
MD5268ec11dd8552a486b097df2a61b4111
SHA1f6430ed03059c9793edf6c70c23600cebde18e52
SHA256dd5a1d169d207d3db62a07304b7649adc6b654b3d707c0ef7150fd827392c831
SHA512473b56aecea9ae73c2d5744e624df1844ef9f0bbd38a0d2e560df16d41372c208490df0dd00121220011e2b6883ef7a8c028ce44fda6b488348237f4d7aa19a6
-
Filesize
90KB
MD56a9c36332255fca66c688c75aa68e1de
SHA12a03e2a5e6a8d9e2b0cfb4e2cc1923d9c08578c1
SHA2567b7ebada5da99a20c44eaf77e6d673985da42d9b7cb4f5e4235b7579581ae170
SHA512a638c48026f2a0b565b34d7d0dfacfec4f582e698f88234521a6fcff1ed90c134f39aa3311cca2a67e401de01f81cac01d9f792f189127e0f87a345076827627
-
Filesize
10.4MB
MD5da7e08ef168ee4662ff1878202303a36
SHA1df3bc617162a0f5f5e854403f5dc1e00e093e498
SHA256ed9e8f5fda10a14fbce76252b111a031bc4f3351e9eb342ea4edf6b6d16add69
SHA512bd248c68077a6aa1d6120cd3401770b09762cd75010a30b40cdd46196c726bce2fffa9036a2e3f47bbdbe4b935b9252c7ea38f4947d5ef187831d274a13b8974
-
Filesize
12.8MB
MD5fa33d66feb147e2b78f0c0332c054622
SHA159b357b98b307c9f0de0d3972bd98c2c2dd62e95
SHA2562111ae90771f38a54b87f4c9e9bc0500adeabeaf9b9df7e2ffa5f3cf9335ed07
SHA512f6266368dd3c76304c3ec3b5f168572d0c3f5a3c646ddc5ccc3c529e1fbcd5e61eb4ecf36597af3f296295864d64441bd7345ea391d75f3fe5d46a48e1fe2137
-
\??\Volume{6e183fb6-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{6ac28c79-d287-4cfe-a4fb-2ae464d7113c}_OnDiskSnapshotProp
Filesize6KB
MD53c88e1805f8ef0e1bceac718c335cd8f
SHA1cad1e070262c3166497116748a93dc2051b8025e
SHA2566b856b68c4236e9a1fe0c58e5f40c5cd6a5cd2bf92d92d4653c4798d03ca5d29
SHA5129acd56a9cfdd9f1e82a3e1f761abd3b4bc01b5dc09ca42de616c31b2db5a6620d8bd6841ebe4548c568b3abfa4f27d406e91cf01174165ef92388e59459985e3