Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
80s -
max time network
82s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21/08/2024, 15:42
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1FIpHm1dxG2bMfqj7lQI68XysszxDFeMW/view?usp=sharing
Resource
win11-20240802-en
General
-
Target
https://drive.google.com/file/d/1FIpHm1dxG2bMfqj7lQI68XysszxDFeMW/view?usp=sharing
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1316 Main.exe -
Loads dropped DLL 1 IoCs
pid Process 1316 Main.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 4 drive.google.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1316 set thread context of 1980 1316 Main.exe 115 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Main.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aspnet_regiis.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2842058299-443432012-2465494467-1000\{9FCA6312-5D47-4318-8367-7A3A651BA3A7} msedge.exe Key created \REGISTRY\USER\S-1-5-21-2842058299-443432012-2465494467-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Main.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 72 msedge.exe 72 msedge.exe 852 msedge.exe 852 msedge.exe 3352 identity_helper.exe 3352 identity_helper.exe 4604 msedge.exe 4604 msedge.exe 992 msedge.exe 992 msedge.exe 4200 msedge.exe 4200 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 16 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 4484 7zG.exe Token: 35 4484 7zG.exe Token: SeSecurityPrivilege 4484 7zG.exe Token: SeSecurityPrivilege 4484 7zG.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 4484 7zG.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe 852 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2492 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 852 wrote to memory of 2280 852 msedge.exe 81 PID 852 wrote to memory of 2280 852 msedge.exe 81 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 3100 852 msedge.exe 82 PID 852 wrote to memory of 72 852 msedge.exe 83 PID 852 wrote to memory of 72 852 msedge.exe 83 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84 PID 852 wrote to memory of 3608 852 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://drive.google.com/file/d/1FIpHm1dxG2bMfqj7lQI68XysszxDFeMW/view?usp=sharing1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffc369a3cb8,0x7ffc369a3cc8,0x7ffc369a3cd82⤵PID:2280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:72
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2652 /prefetch:82⤵PID:3608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3224 /prefetch:12⤵PID:4816
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3272 /prefetch:12⤵PID:2908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4936 /prefetch:12⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5468 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5076 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5728 /prefetch:12⤵PID:3620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5984 /prefetch:12⤵PID:2296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5084 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:992
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5616 /prefetch:12⤵PID:560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6708 /prefetch:12⤵PID:4556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6476 /prefetch:12⤵PID:4972
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3616 /prefetch:12⤵PID:2156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5612 /prefetch:12⤵PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5716 /prefetch:82⤵PID:4068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --service-sandbox-type=video_capture --mojo-platform-channel-handle=5796 /prefetch:82⤵
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4200
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6776 /prefetch:12⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=23 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7048 /prefetch:12⤵PID:3056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=7040 /prefetch:12⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6180 /prefetch:12⤵PID:640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1724,1957242263660501218,9323283358842838188,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=26 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1652 /prefetch:12⤵PID:976
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2004
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4048
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2492
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3052
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\" -an -ai#7zMap22278:70:7zEvent279971⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4484
-
C:\Users\Admin\Downloads\Main\Main.exe"C:\Users\Admin\Downloads\Main\Main.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regiis.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5026e0c65239e15ba609a874aeac2dc33
SHA1a75e1622bc647ab73ab3bb2809872c2730dcf2df
SHA256593f20dfb73d2b81a17bfcc1f246848080dfc96898a1a62c5ddca62105ed1292
SHA5129fb7644c87bdd3430700f42137154069badbf2b7a67e5ac6c364382bca8cba95136d460f49279b346703d4b4fd81087e884822a01a2a38901568a3c3e3387569
-
Filesize
152B
MD5228fefc98d7fb5b4e27c6abab1de7207
SHA1ada493791316e154a906ec2c83c412adf3a7061a
SHA256448d09169319374935a249b1fc76bcf2430b4e1436611f3c2f3331b6eafe55a2
SHA512fa74f1cc5da8db978a7a5b8c9ebff3cd433660db7e91ce03c44a1d543dd667a51659ba79270d3d783d52b9e45d76d0f9467458df1482ded72ea79c873b2a5e56
-
Filesize
41KB
MD59a25111c0e90867c7b8f41c5462abfaf
SHA10619625d479f31cf145c2e3714de0df4a69169d1
SHA25641bb42020f1beabc9e72913ef6a33aa264556ec829ac70fd92c9c9adfb84803d
SHA5120fbc3c64d6f5acc2c0dab67924b0c669fefa994f449240d1f6b78dcac3538343938a4fae972726156189f05806d3aae0e333035df52605ffe28886b82f31ccdd
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize2KB
MD5222dd5298b478d171da3d96219d002cc
SHA1830e817dba8b4453c73682d38181af842d22c998
SHA25677ee4c51e498b12367509159aaba73df78efe8cae23b161805404b2d51b84643
SHA5128303a1d9ab8d899c2417f5b26e6d162d30d93112b22d55ee8cfc9c18af4fdee2e0ae02e50a70f2324b33477bab4fb39e18caee6f90ebfc426d872a0d6837d670
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize624B
MD58162e74c557a1da95767d67c27b4ed2c
SHA1707b5ad322e4deb9c63c23bd08dc1e934f3f16cd
SHA2566b22c54a5464be17872b0bd6b5f67e8d29529f45184a2276538bdc414a54649f
SHA512c29388b1a65e97e3c639d2112b82fb8754a0c8fccea827241eca820bd962e026cb9f6bc97e98b80d3536aa8ca2ae37cb685cb05f84cca12fdf7ce3d9fbd61304
-
Filesize
4KB
MD587daad8b4e44ca941e9467702356ad1f
SHA1c37e87535b315aa1007f9911b5fd2b3da0a2ea83
SHA256e8556be0acc87207c4f97b97b24af4678549b0baab3e603661374200affd233b
SHA512c277dceb68d0c02e2d0e81638f19c96b2975d95b627df21f408ae52f42290eec1eba90e6a7d1d399529bd7d81363ec17abf8f4d5b80a88b2ed02c2d5dccfe692
-
Filesize
5KB
MD53fdcad4611f8fb9d89fa601626095faa
SHA1a7308257334a3c817a2038220180e17e24fdf2b1
SHA256b6c289a76bf62378ee6cd4bfa090c64b73fd30117d9f3365c0aa57e8ebd59f90
SHA5120bcc022677eb6e43121493e9eeee7d7fa0ca9c7aeeb64b529e28c9efdad673bc16280beba9e6317d5f0673c04abc138140ea6e1341b1534189f0a21f8a1935bc
-
Filesize
6KB
MD505d908c7a114171a36d5561a4b22bc83
SHA142f3cbaaa0b95fb603f568bfff96136253a7d7fe
SHA256a0105da19c9ce80334885764898ed49ba8457a6aca564b8ff67ead1dd18a95f9
SHA51255aa7911c92edcab197a553a5f742f1b60d334725d344e7c6b8c14fb6a96400dc5b93e9cc4a3ec6343b024381a43e2f6c99e771fa06afd948c2106319e7b00a5
-
Filesize
6KB
MD5b1f5a936878d1249bc0db14baf8d7af2
SHA140f78266f86b2f02ea1b431075e700e1fb02e910
SHA2566de25c16cc7f871e20b3b7ae1d5e4a80b4a1a3386683a2a826a234ff175754ed
SHA512951d6c31d96cc1c464593760bc09d4fab9b3e5ec33608d0fc4a299c107a34c7f5defa13f2ea4a248c95575ed1ef953010ccac60ab35bed26ab48b350a97c92a8
-
Filesize
6KB
MD52752e0bcadcb70657680ece2346bb532
SHA11c9f8399ba7ad07bad125280f5a541335a5846b4
SHA2567994784b1b2f3796aa5276e7415ef2f1c9dbe28942637523bff3bbb52bd218d1
SHA5120de33cccea64b39c8de57b4ac08da94ffed3f058d767474cc6ca75fc943dc19d09ab17dc18f084f73ec252835ff7bef26048768936a26366ab33e3a40b9b7c55
-
Filesize
1KB
MD523676aaa03e0d723a15071e615872376
SHA124fa9d80cbd74740fd3c6794f251370664c422aa
SHA256f68801bd58ea5dc30eb555ee9b8adc2758a221926e9ab2e798ebd034faed1944
SHA512af4ed3a1ece57e6c29c8150ec346c6ae8fd9d2ecf4840e6fe6c840f2aa22bfaca87b5613f1681c9d6c564c6a09bdbc6bc9acd5aedf9f210f02efad12c69673bc
-
Filesize
1KB
MD5e973174be575c186041decacdff0480f
SHA12684409f2f813a92ffe6d6f2b73c49800265285c
SHA2569ee5a7337e6c5a4f4527ed32e308f39ba688035f1e13395df6b3308faceeeee3
SHA5123adde48a854d8b73bafa1564a5c77a68efb1ba62fd3cbcfae553b72808cca6a7f04df066bcd220780478aa8c89e3e369f1e3518265a4465a500fa93809c0a25a
-
Filesize
1KB
MD5632cf9135756cbf1e3b2f25335d2cd0c
SHA12b0514eeabf8050234ad6b6e961f1cc1bfabff67
SHA2562ca53670eabac9191e088b9c51ab546c12d418375ea0e3226d92da8f16ed9776
SHA5126b889407ad723aea6bfc3b269d0a226f259203585d7da1f7efcbffdfab861eae0590e190f0084c765646572b8aed22d95085532396b70b54f355e65103c83218
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
11KB
MD52990d55e0c9f1627fd1325347ba2f1c0
SHA1d9fd703feab5f363e1b2508239691367148c55dc
SHA2566af669d93202b593cf0c72787908438d173bf54265b374866457ddbea82c8d17
SHA5127f29eccc30425d6d640830b018a950e4ab7b06bcef26b2b86956ee25edf1dbc2f4016e332a0df1883db508820fe07ea1aa333d91cdeafcc08e261e93ca816f6f
-
Filesize
11KB
MD5212c1fb542ece16e809ad1e35f9dcf54
SHA116388821f2e269130022f001d519a669bc1ab816
SHA256f79878278f84d318e3599427598bce9d388fd3e3dcda7c8568b67e0a9fe39c78
SHA512e24eb9dbdc66be70346032e1c5b097e5709fae5979c6bd62c319acdbea50c5c344751e2f8b55bacad47cbba6891e79719041502eda2e6a2ad80c34065f2f3332
-
Filesize
11KB
MD5f3e577f84e500e16e59ccafc223c36e7
SHA153ffdd7ec74598c0cf784486eb11f19238acddba
SHA256fe3fb578c54e7ddc1942a78f47e6f33e8c8907c75757afbada100ae19c9886a7
SHA512e95e9f775b7b76d4bc0b16276570816cb0c458f92ef8ea5b9188fa004da19209177a48f095b7d102b6baa31090fba2381b3b00940b9962a4f41fe82fcea3bb7b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD541ce6cd728e8893a0387cd1d5aaf201d
SHA1c6c5257c73d52968b03fa7a332f61f050229999c
SHA256c6ff6212cd4c01ff44605a8339568c3ed2b9dd85c7956873ee9db592e24b654d
SHA51273c40effe3fa0c521cdd5347e85ac142666a5a7b982d96c80f4c08c079d2f5a8d58c12644af20f27b8480040eb74b28d0696be16fc9566c02bf2d60d08839c27
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD59bef7c41d0bb3a44a18c637e03b43e7e
SHA1f093796be97df77af8a2595d56816f813d2f6558
SHA256ffb02e89bbf055faff78823c2dfff35172c48a095d8f698bcdb447a86408ebf8
SHA5127f543a259b79eb4ac25db95bd1059d746acfc192f3d5ddb44d3a63990a2cd31d6b404c0ec3b659457de58a5bad5254680764eaa6a7f6dc35076971f2542750fa
-
Filesize
472KB
MD58ee22e5eed62160bbd73486515444675
SHA12e4a73f154b8fa0c6c5ad4dc9eb39a42374cd8d9
SHA256cc1cdd0247e83886a1b014a5048e2a920b92d1cc7e82f23a93cf51c56bc72e5f
SHA5129ba3e72705e02c21f70cb6172a0833e14e70c96ebb63722763fdb69de179126d1232740c7646209628104b5e8f514556a98761f770cbb21c1cb2bd3a0cc2bdaf
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
Filesize
678KB
MD58420aa3e4c994b17e2c002217731642b
SHA1e4a698d615cf7fc6b79d3e4c01e724a63eab2481
SHA256b0a1383874ecbd60ffc63d78c9ae35b972c1f07d73f7ce61ad0fc1302e83058d
SHA512603b66b68af4b212886dee102f54e88a1c1a13e17ed7915bae8d8c7ff3fdff35da4d2b44bc7d26c553f85d61436e6a5b73e0dcb3c5ee217515ea98b9b6f6fc86
-
Filesize
459KB
MD57195af62b3759e6be253dd70439b5140
SHA1eabc4b74e35440bb81d516047d9cfbda012d2191
SHA25662fa84dd433bdb0df7e0557696e85ceb43a5e32e166ef05ffda740f1e0c58015
SHA5125aba510a4af1df154b84d6f54c4b3f821ec621664c2a3c962197ea034e31ac4d7b9af8f3bfe3564a5f0c1d98a93de302e631527e58e9f4da87c62bd5558d382f