Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
3xd-AntiSpy_modern.zip
windows11-21h2-x64
1Localizati...ry.dll
windows11-21h2-x64
1Newtonsoft.Json.dll
windows11-21h2-x64
1PluginInterface.dll
windows11-21h2-x64
1lang.json
windows11-21h2-x64
3plugins/Cl...e.json
windows11-21h2-x64
3plugins/Fi...y.json
windows11-21h2-x64
3plugins/Pl...er.dll
windows11-21h2-x64
1plugins/Pl...er.ps1
windows11-21h2-x64
3plugins/Pl...er.dll
windows11-21h2-x64
1plugins/Pl...r.json
windows11-21h2-x64
3plugins/Re...er.ps1
windows11-21h2-x64
8plugins/Sn...t.json
windows11-21h2-x64
3plugins/Un...ve.ps1
windows11-21h2-x64
8plugins/Us...e.json
windows11-21h2-x64
3plugins/Us...l.json
windows11-21h2-x64
3xd-AntiSpy.exe
windows11-21h2-x64
xd-AntiSpy.png
windows11-21h2-x64
3Analysis
-
max time kernel
586s -
max time network
443s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
12/08/2024, 07:15
Static task
static1
Behavioral task
behavioral1
Sample
xd-AntiSpy_modern.zip
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
LocalizationLibrary.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
Newtonsoft.Json.dll
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
PluginInterface.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
lang.json
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
plugins/Clear Icon Cache.json
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
plugins/File Extensions Visibility.json
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
plugins/PluginButler.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
plugins/PluginButler.ps1
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
plugins/PluginDebloater.dll
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
plugins/PluginDebloater.json
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
plugins/Restart Explorer.ps1
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
plugins/Snap Assist Flyout.json
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
plugins/Uninstall OneDrive.ps1
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
plugins/Use light theme.json
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
plugins/User Account Control.json
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
xd-AntiSpy.exe
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
xd-AntiSpy.png
Resource
win11-20240802-en
General
-
Target
plugins/Uninstall OneDrive.ps1
-
Size
2KB
-
MD5
d3228595fe69c9f115e84592c6a70e48
-
SHA1
6795f195012476b278b1dee2766d8e62df96d0a7
-
SHA256
945f7e685db6fc568cc8eb114b4d54dd7d1d5feb0879c84fe3f82ed786ae3b8d
-
SHA512
5fae9274601b7bbfd8d3ec2ecba984e59dbfd20a8c31d5bd3bf8f32de9c004916ecea6328db2b1dfb5e2fc9737dbdf769104afe2c8f7476d695dd3b1d3827554
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDriveSetup.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\OneDrive\desktop.ini powershell.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: explorer.exe File opened (read-only) \??\F: explorer.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..lers-onedrivebackup_31bf3856ad364e35_10.0.22000.1_none_fdfb42912f134f7c\SettingsHandlers_OneDriveBackup.dll powershell.exe File opened for modification C:\Windows\WinSxS\amd64_microsoft-windows-s..lers-onedrivebackup_31bf3856ad364e35_10.0.22000.1_none_fdfb42912f134f7c powershell.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-onedrive-setup_31bf3856ad364e35_10.0.22000.1_none_85d889245f3a20db\OneDrive.ico powershell.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-onedrive-setup_31bf3856ad364e35_10.0.22000.1_none_85d889245f3a20db\OneDriveSetup.exe powershell.exe File opened for modification C:\Windows\WinSxS\wow64_microsoft-windows-onedrive-setup_31bf3856ad364e35_10.0.22000.1_none_85d889245f3a20db powershell.exe -
pid Process 4916 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDriveSetup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe -
Checks SCSI registry key(s) 3 TTPs 58 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\HardwareID explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{cf73bb51-3abf-44a2-85e0-9a3dc7a12132}\0006 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0002 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{a45c254e-df1c-4efd-8020-67d146a850e0}\0011 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\FriendlyName explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000002\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\007A explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{51236583-0c4a-4fe8-b81f-166aec13f510}\0064 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Properties\{afd97640-86a3-4210-b67c-289c41aabe55}\0003 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{259abffc-50a7-47ce-af08-68c9a7d73366}\000C explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Properties\{540b947e-8b40-45bc-a8a2-6a0b894cbda2}\0009 explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\Capabilities explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{8c7ed206-3f8a-4827-b3ab-ae9e1faefc6c}\0004 explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{78c34fc8-104a-4aca-9ea4-524d52996e57}\005A explorer.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_Msft&Prod_Virtual_DVD-ROM\2&1f4adffe&0&000001\HardwareID explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS SearchHost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU SearchHost.exe -
Kills process with taskkill 2 IoCs
pid Process 4992 taskkill.exe 1640 taskkill.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Internet Explorer\GPU SearchHost.exe -
Modifies registry class 64 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{3A4E62AE-45D9-41D5-85F5-A45B77AB44E5} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{B54E7079-90C9-4C62-A6B8-B2834C33A04A}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\Interface\{049FED7E-C3EA-4B66-9D92-10E8085D60FB} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\VERSIONINDEPENDENTPROGID OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\FileSyncClient.AutoPlayHandler.1 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{9D613F8A-B30E-4938-8490-CB5677701EBF}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{1b7aed4f-fcaf-4da4-8795-c03e635d8edc} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\FileSyncClient.AutoPlayHandler\shell\import OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{F0AF7C30-EAE4-4644-961D-54E6E28708D6}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{1196AE48-D92B-4BC7-85DE-664EC3F761F1}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{22A68885-0FD9-42F6-9DED-4FB174DC7344}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{944903E8-B03F-43A0-8341-872200D2DA9C}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{2387C6BD-9A36-41A2-88ED-FF731E529384}\PROXYSTUBCLSID32 OneDriveSetup.exe Set value (data) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.PeopleExperienceHost_cw5n1h2txyewy\ApplicationFrame\Microsoft.Windows.PeopleExperienceHo = 6801000088020000 explorer.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{1B71F23B-E61F-45C9-83BA-235D55F50CF9}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\BannerNotificationHandler.BannerNotificationHandler\shell OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{2692D1F2-2C7C-4AE0-8E73-8F37736C912D} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{1B7AED4F-FCAF-4DA4-8795-C03E635D8EDC}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\SYNCENGINEFILEINFOPROVIDER.SYNCENGINEFILEINFOPROVIDER\CURVER OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\CLSID\{389510B7-9E58-40D7-98BF-60B911CB0EA9}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{B5C25645-7426-433F-8A5F-42B7FF27A7B2}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{B5C25645-7426-433F-8A5F-42B7FF27A7B2}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{EA23A664-A558-4548-A8FE-A6B94D37C3CF}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{31508CC7-9BC7-494B-9D0F-7B1C7F144182} OneDriveSetup.exe Key created \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Explorer\DOMStorage SearchHost.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\Interface\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\VERSIONINDEPENDENTPROGID OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\FILESYNCCLIENT.AUTOPLAYHANDLER.1\CLSID OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{8B9F14F4-9559-4A3F-B7D0-312E992B6D98}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\CLSID\{389510B7-9E58-40D7-98BF-60B911CB0EA9}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{869BDA08-7ACF-42B8-91AE-4D8D597C0B33} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\FileSyncClient.AutoPlayHandler OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{10C9242E-D604-49B5-99E4-BF87945EF86C}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\FileSyncClient.AutoPlayHandler\shell OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\CLSID\{2E7C0A19-0438-41E9-81E3-3AD3D64F55BA}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{22A68885-0FD9-42F6-9DED-4FB174DC7344} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{C1439245-96B4-47FC-B391-679386C5D40F}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\TypeLib\{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}\1.0\0 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\PROGID OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{79A2A54C-3916-41FD-9FAB-F26ED0BBA755}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{E9DE26A1-51B2-47B4-B1BF-C87059CC02A7}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{0d4e4444-cb20-4c2b-b8b2-94e5656ecae8} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{D8C80EBB-099C-4208-AFA3-FBC4D11F8A3C}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\Interface\{1B71F23B-E61F-45C9-83BA-235D55F50CF9} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{FAC14B75-7862-4CEB-BE41-F53945A61C17}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{9D613F8A-B30E-4938-8490-CB5677701EBF} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\TYPELIB OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\Interface\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\WOW6432Node\Interface\{02C98E2C-6C9F-49F8-9B57-3A6E1AA09A67} OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\OOBEREQUESTHANDLER.OOBEREQUESTHANDLER.1\CLSID OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\WOW6432NODE\INTERFACE\{0776AE27-5AB9-4E18-9063-1836DA63117A}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\INTERFACE\{02C98E2C-6C9F-49F8-9B57-3A6E1AA09A67}\PROXYSTUBCLSID32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_CLASSES\CLSID\{021E4F06-9DCC-49AD-88CF-ECC2DA314C8A}\LOCALSERVER32 OneDriveSetup.exe Key deleted \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000_Classes\TypeLib\{638805C3-4BA3-4AC8-8AAC-71A0BA2BC284} OneDriveSetup.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4916 powershell.exe 4916 powershell.exe 3936 explorer.exe 3936 explorer.exe 4924 OneDriveSetup.exe 4924 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe 456 OneDriveSetup.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4916 powershell.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 1640 taskkill.exe Token: SeRestorePrivilege 4004 reg.exe Token: SeRestorePrivilege 4856 reg.exe Token: SeIncreaseQuotaPrivilege 4916 powershell.exe Token: SeSecurityPrivilege 4916 powershell.exe Token: SeTakeOwnershipPrivilege 4916 powershell.exe Token: SeLoadDriverPrivilege 4916 powershell.exe Token: SeSystemProfilePrivilege 4916 powershell.exe Token: SeSystemtimePrivilege 4916 powershell.exe Token: SeProfSingleProcessPrivilege 4916 powershell.exe Token: SeIncBasePriorityPrivilege 4916 powershell.exe Token: SeCreatePagefilePrivilege 4916 powershell.exe Token: SeBackupPrivilege 4916 powershell.exe Token: SeRestorePrivilege 4916 powershell.exe Token: SeShutdownPrivilege 4916 powershell.exe Token: SeDebugPrivilege 4916 powershell.exe Token: SeSystemEnvironmentPrivilege 4916 powershell.exe Token: SeRemoteShutdownPrivilege 4916 powershell.exe Token: SeUndockPrivilege 4916 powershell.exe Token: SeManageVolumePrivilege 4916 powershell.exe Token: 33 4916 powershell.exe Token: 34 4916 powershell.exe Token: 35 4916 powershell.exe Token: 36 4916 powershell.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeIncreaseQuotaPrivilege 4924 OneDriveSetup.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe Token: SeCreatePagefilePrivilege 3936 explorer.exe Token: SeShutdownPrivilege 3936 explorer.exe -
Suspicious use of FindShellTrayWindow 37 IoCs
pid Process 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe 3936 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3936 explorer.exe 1864 SearchHost.exe 2660 StartMenuExperienceHost.exe 3936 explorer.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4916 wrote to memory of 4992 4916 powershell.exe 80 PID 4916 wrote to memory of 4992 4916 powershell.exe 80 PID 4916 wrote to memory of 1640 4916 powershell.exe 82 PID 4916 wrote to memory of 1640 4916 powershell.exe 82 PID 4916 wrote to memory of 4924 4916 powershell.exe 83 PID 4916 wrote to memory of 4924 4916 powershell.exe 83 PID 4916 wrote to memory of 4924 4916 powershell.exe 83 PID 4916 wrote to memory of 4004 4916 powershell.exe 85 PID 4916 wrote to memory of 4004 4916 powershell.exe 85 PID 4916 wrote to memory of 5040 4916 powershell.exe 86 PID 4916 wrote to memory of 5040 4916 powershell.exe 86 PID 4916 wrote to memory of 4856 4916 powershell.exe 87 PID 4916 wrote to memory of 4856 4916 powershell.exe 87 PID 4916 wrote to memory of 3936 4916 powershell.exe 88 PID 4916 wrote to memory of 3936 4916 powershell.exe 88 PID 4924 wrote to memory of 3912 4924 OneDriveSetup.exe 93 PID 4924 wrote to memory of 3912 4924 OneDriveSetup.exe 93 PID 4924 wrote to memory of 3912 4924 OneDriveSetup.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy bypass -File "C:\Users\Admin\AppData\Local\Temp\plugins\Uninstall OneDrive.ps1"1⤵
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /F /IM OneDrive.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\system32\taskkill.exe"C:\Windows\system32\taskkill.exe" /F /IM explorer.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1640
-
-
C:\Windows\SysWOW64\OneDriveSetup.exe"C:\Windows\SysWOW64\OneDriveSetup.exe" /uninstall2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\OneDriveSetup.exe"C:\Windows\SysWOW64\OneDriveSetup.exe" C:\Windows\SysWOW64\OneDriveSetup.exe /uninstall /permachine /childprocess /silent /renameReplaceOneDriveExe /renameReplaceODSUExe /cusid:S-1-5-21-3761892313-3378554128-2287991803-10003⤵
- System Location Discovery: System Language Discovery
PID:3912
-
-
C:\Windows\SysWOW64\OneDriveSetup.exeC:\Windows\SysWOW64\OneDriveSetup.exe /uninstall /peruser /childprocess /renameReplaceOneDriveExe /renameReplaceODSUExe3⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" load hku\Default C:\Users\Default\NTUSER.DAT2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" delete HKEY_USERS\Default\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v OneDriveSetup /f2⤵PID:5040
-
-
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" unload hku\Default2⤵
- Suspicious use of AdjustPrivilegeToken
PID:4856
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Enumerates connected drives
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3936
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\SearchHost.exe" -ServerName:CortanaUI.AppXstmwaab17q5s3y22tp6apqz7a45vwv65.mca1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1864
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of SetWindowsHookEx
PID:2660
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{E2B3C97F-6AE1-41AC-817A-F6F92166D7DD}1⤵
- System Location Discovery: System Language Discovery
PID:4936
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
77B
MD53c0a69567e7844018081649337d97e21
SHA19f46eefee1290ef51006efce776bf95c8ceb27f1
SHA2562b6a68c75f693a3d1761b00a7b05f050524a62f8382b6bb385597dab767df3ec
SHA51212ad0349ca56bf51db60b408743c70ba99fde828bb831db2d13a577e6cc241691b778a1bb5cb7df095aaf10694c1fa30162135b6bb8323927726381d9807e8b1
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\ZTZW67SQ\www.bing[1].xml
Filesize15KB
MD55a903d5d01b602b10524c4ae79ec13ca
SHA1fc81d87bab4beb0ae7da52358063e9427ce4cc38
SHA256ed48bdaabadd8bec92a245b3b39491384f1bf59949eb33c0d60aee7d08bbd11f
SHA5125755e07cd0254bf6f80dd26e2512bd33281189cc3b3bcaf28dc994610d7dd87e062203cabab40e5e431e1e6b6d590a28b09e19fcfc8e6bc146fa6151b3f4ab40
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
470B
MD577f3b4ac272afae22d8d9503b4fa3fe5
SHA1668d5dfeee94757692aeaedda32fa817ebb2fbe1
SHA2564e0bdd45b3ab7f5114b767862b46790df33c08ed48f37201d205e1603843a50b
SHA512a05b7a44ef2af0dc62b02e57d43b82006d27d0952fc71abd5aeb9bc41087700709541272ac57cbb5da25e0719c90978f0c47e49444117710d8937e21ad102919
-
Filesize
470B
MD5e585c392b9e16b15d52120e88ec5b82b
SHA1d7a39dd74be17df661c44933232291124420c2ee
SHA2568217d5414e81cfa7f4190266cb9d7838a664841d121508a97aa0d81bcd937e5d
SHA5122b48cad71d83d68a94ff98c3b6c1718e210ea138b1b049fed4dba456566293d01a6fc24c009a58ef3c6f426bcb8772608629928fed3c6933f284f77a348ad10d