Analysis
-
max time kernel
19s -
max time network
24s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02/09/2024, 21:27
Static task
static1
Behavioral task
behavioral1
Sample
Mountain Duck Installer-4.16.2.22310.exe
Resource
win11-20240802-en
Errors
General
-
Target
Mountain Duck Installer-4.16.2.22310.exe
-
Size
71.1MB
-
MD5
84d55a450fa2926bb79e60ff58c40928
-
SHA1
5d03e8437a01a75ba1275705e738a8d1fdc3ef41
-
SHA256
9bac3f08cf1bb979dd74cc37c89e7a16facb87fab60d5a6bcfb2d39478342b41
-
SHA512
741f1050f2f697beeec8bc9833ff69fa315ce0e2f4ed615259454d9a7f8c5eafa0df88551dc0df29adeb3429d600deef1a3c84861a3e15554a4719f9b2e1494d
-
SSDEEP
1572864:cnSaNVpwDBChonYKHRngFHwW8WXZROXhqw7b9XlEbdJhLpIaxhO0jqeQbb4D7xRv:qFwDUoNaZ2hqANlEvnHO347fMGCO
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\CallbackTechMountNotificator-cbfs20 = "{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\CallbackTechMountNotificator-cbfs20 = "{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}" MsiExec.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\system32\drivers\cbfs20.sys MsiExec.exe -
Modifies Shared Task Scheduler registry keys 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3} = "Virtual Storage Mount Notification" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\SharedTaskScheduler\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3} = "Virtual Storage Mount Notification" regsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\{11436c5a-53fd-4391-ac55-5455d5e0e733} = "\"C:\\ProgramData\\Package Cache\\{11436c5a-53fd-4391-ac55-5455d5e0e733}\\Mountain Duck Installer-4.16.2.22310.exe\" /burn.runonce" Mountain Duck Installer-4.16.2.22310.exe Set value (str) \REGISTRY\USER\S-1-5-21-3761892313-3378554128-2287991803-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mountain Duck = "C:\\PROGRA~1\\MOUNTA~1\\MOUNTA~1.EXE" msiexec.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 2 1788 msiexec.exe 3 1788 msiexec.exe 4 1788 msiexec.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\$RECYCLE.BIN\S-1-5-18\desktop.ini MsiExec.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\T: msiexec.exe -
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}' regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}'\ = "Virtual Storage Mount Notification" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}'\NoInternetExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}' MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}'\ = "Virtual Storage Mount Notification" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}'\NoInternetExplorer = "1" MsiExec.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\cbfsevtmsg.dll MsiExec.exe File created C:\Windows\system32\cbfsShellHelper20.dll MsiExec.exe File created C:\Windows\SysWOW64\cbfsShellHelper20.dll MsiExec.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Mountain Duck\System.Windows.Interactivity.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativityErrorOverlay_x86.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Beans.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Misc.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Naming.dll msiexec.exe File created C:\Program Files\Mountain Duck\Mountainduck.Core.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Text.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.XML.Transform.dll msiexec.exe File created C:\Program Files\Mountain Duck\System.ValueTuple.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativityContextMenus_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\Mountainduck.Cbfs.dll msiexec.exe File created C:\Program Files\Mountain Duck\msvcr120.dll msiexec.exe File created C:\Program Files\Mountain Duck\profiles\SMB.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\site.ico msiexec.exe File created C:\Program Files\Mountain Duck\profiles\Azure.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\jnidispatch.dll msiexec.exe File created C:\Program Files\Mountain Duck\Microsoft.Extensions.DependencyInjection.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativityUptodateOverlay_x86.dll msiexec.exe File created C:\Program Files\Mountain Duck\Credits.rtf msiexec.exe File created C:\Program Files\Mountain Duck\profiles\File.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Jdbc.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Security.dll msiexec.exe File created C:\Program Files\Mountain Duck\profiles\DAV.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.Management.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativityErrorOverlay_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\Splat.Microsoft.Extensions.DependencyInjection.dll msiexec.exe File created C:\Program Files\Mountain Duck\callback.CBFSConnect.dll msiexec.exe File created C:\Program Files\Mountain Duck\System.Buffers.dll msiexec.exe File created C:\Program Files\Mountain Duck\profiles\B2.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\Microsoft.Extensions.DependencyInjection.Abstractions.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.XML.API.dll msiexec.exe File created C:\Program Files\Mountain Duck\LiferayNativityWindowsUtil_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\Microsoft.Toolkit.Uwp.Notifications.dll msiexec.exe File created C:\Program Files\Mountain Duck\System.Numerics.Vectors.dll msiexec.exe File created C:\Program Files\Mountain Duck\cbfsconnect20.dll msiexec.exe File created C:\Program Files\Mountain Duck\DynamicData.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativityInfiniteOverlay_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativityUptodateOverlay_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\Cyberduck.Core.Refresh.dll msiexec.exe File created C:\Program Files\Mountain Duck\profiles\S3 (HTTPS).cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\ReactiveUI.Wpf.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativityUtil_x86.dll msiexec.exe File created C:\Program Files\Mountain Duck\Castle.Core.dll msiexec.exe File created C:\Program Files\Mountain Duck\tokenizingtextbox.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativitySyncOverlay_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\System.Threading.Tasks.Extensions.dll msiexec.exe File created C:\Program Files\Mountain Duck\WinSparkle.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativityIgnoredOverlay_x86.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativityMaliciousOverlay_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\Cyberduck.Cryptomator.dll msiexec.exe File created C:\Program Files\Mountain Duck\cryptomator.ico msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.XML.Bind.dll msiexec.exe File created C:\Program Files\Mountain Duck\IKVM.OpenJDK.XML.XPath.dll msiexec.exe File created C:\Program Files\Mountain Duck Shell Extension\LiferayNativityPauseOverlay_x64.dll msiexec.exe File created C:\Program Files\Mountain Duck\sunmscapi.dll msiexec.exe File created C:\Program Files\Mountain Duck\System.Reactive.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativityContextMenus_x86.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativityPauseOverlay_x86.dll msiexec.exe File created C:\Program Files\Mountain Duck\profiles\Google Drive.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\profiles\Nextcloud.cyberduckprofile msiexec.exe File created C:\Program Files\Mountain Duck\Hardcodet.NotifyIcon.Wpf.dll msiexec.exe File created C:\Program Files\Mountain Duck\ReactiveUI.Validation.dll msiexec.exe File created C:\Program Files (x86)\Mountain Duck Shell Extension\LiferayNativitySyncOverlay_x86.dll msiexec.exe File created C:\Program Files\Mountain Duck\Cyberduck.Core.dll msiexec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\ExtFFFC.tmp MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\cbfspnpbus.inf MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\arm64\cbfspnpbus.sys MsiExec.exe File created C:\Windows\Installer\e57f1a7.msi msiexec.exe File opened for modification C:\Windows\Installer\MSI628.tmp msiexec.exe File created C:\Windows\Installer\e57f1a3.msi msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\vpnpbus.inf MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\ia64\SHA1\vpnpbus.sys MsiExec.exe File created C:\Windows\inf\oem1.PNF MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\arm64\wow64sup.exe MsiExec.exe File created C:\Windows\SystemTemp\~DFAFBDDD5D40FBA6F6.TMP msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\vpnpbus.cat MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\SHA1\vpnpbus.cat MsiExec.exe File created C:\Windows\inf\oem2.PNF MsiExec.exe File opened for modification C:\Windows\Installer\e57f1a8.msi msiexec.exe File created C:\Windows\Installer\e57f1ac.msi msiexec.exe File opened for modification C:\Windows\Installer\{D8E24188-B554-4FF6-B48A-54B867FA25E9}\icon.ico msiexec.exe File created C:\Windows\SystemTemp\~DFCC71A0BC758602AD.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIF8A9.tmp msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\SHA1\vpnpbus.inf MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\vpnpbus.sys MsiExec.exe File created C:\Windows\SystemTemp\~DF0280AFB793418431.TMP msiexec.exe File opened for modification C:\Windows\Installer\MSIF666.tmp msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\SHA1\cbfsconnect2017.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\vpnpbus.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\SHA1\vpnpbus.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\vpnpbus.cat MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\SHA1\cbfs20.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\SHA1\cbfspnpbus.sys MsiExec.exe File created C:\Windows\Installer\SourceHash{FA26A191-EF4E-433E-BD98-FB0D87B4C8A6} msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\{D8E24188-B554-4FF6-B48A-54B867FA25E9}\cd_document.ico msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\cbfsconnectevtmsg.dll MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\cbfsconnectMntNtf2017.dll MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\arm64\cbfspnpbus.inf MsiExec.exe File created C:\Windows\Installer\{D8E24188-B554-4FF6-B48A-54B867FA25E9}\icon.ico msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\SHA1\cbfsconnect2017.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\cbfsconnect2017.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\ia64\SHA1\cbfsconnect2017.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\cbfsconnectMntNtf2017.dll MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\Ext28F.tmp MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\cbfspnpbus.inf MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\cbfsShellHelper20.dll MsiExec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\SystemTemp\~DFEB389AEA6DCA6C0C.TMP msiexec.exe File opened for modification C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\Ext28F.tmp MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\SHA1\cbfs20.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\SHA1\cbfspnpbus.cat MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\cbfspnpbus.cat MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\arm64\cbfspnpbus.cat MsiExec.exe File opened for modification C:\Windows\Installer\ExtFFFD.tmp MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\x64\SHA1\vpnpbus.inf MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\cbfs20.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\SHA1\cbfspnpbus.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\SHA1\cbfspnpbus.cat MsiExec.exe File created C:\Windows\SystemTemp\~DF6E0BC335F0EA09B3.TMP msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\SHA1\vpnpbus.sys MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\vpnpbus.inf MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\ia64\SHA1\vpnpbus.inf MsiExec.exe File opened for modification C:\Windows\Installer\Ext28E.tmp MsiExec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\cbfs20.sys MsiExec.exe File created C:\Windows\Installer\e57f1a8.msi msiexec.exe File created C:\Windows\Installer\CBFFFFB.tmp\cbfsconnect2017-Mountain Duck\i386\cbfsconnect2017.sys MsiExec.exe -
Executes dropped EXE 2 IoCs
pid Process 3004 Mountain Duck Installer-4.16.2.22310.exe 1952 Mountain Duck Installer-4.16.2.22310.exe -
Loads dropped DLL 8 IoCs
pid Process 3004 Mountain Duck Installer-4.16.2.22310.exe 2964 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2864 MsiExec.exe 2260 regsvr32.exe 2964 MsiExec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mountain Duck Installer-4.16.2.22310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mountain Duck Installer-4.16.2.22310.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mountain Duck Installer-4.16.2.22310.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe -
Modifies data under HKEY_USERS 32 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\26\52C64B7E msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\TelemetrySalt = "7" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "135" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\SOFTWARE\CLASSES\LOCAL SETTINGS\MUICACHE\27 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{85315c9a-0000-0000-0000-d01200000000} MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\27 msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\28 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{85315c9a-0000-0000-0000-d01200000000}\NukeOnDelete = "0" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MsiExec.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26 msiexec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{85315c9a-0000-0000-0000-d01200000000}\MaxCapacity = "14116" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\88142E8D455B6FF44BA8458B76AF529E\Language = "1033" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26C0AD76-8A71-445B-91C5-97F4B73E1991}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mountain Duck.License\shell\open msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{FA26A191-EF4E-433E-BD98-FB0D87B4C8A6} Mountain Duck Installer-4.16.2.22310.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C508BFF9-B703-452D-B41D-21BA26A5B55C} msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\s3\URL Protocol msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{DBE63233-DC1B-4360-94BE-16257112A298}\InprocServer32 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\88142E8D455B6FF44BA8458B76AF529E\SourceList\PackageName = "Mountain Duck Installer-4.16.2.22310.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{C508BFF9-B703-452D-B41D-21BA26A5B55C}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.duck\ = "Cyberduck.Bookmark" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E1192D2-8667-4987-A464-824357FC4857}\2.0\0\win32\ = "C:\\Windows\\Installer\\CBFFFFB.tmp\\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\\x64\\cbfsShellHelper20.dll" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mountainducklicense\ = "Mountain Duck.License" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Applications msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{7F65F3AA-CDD1-4875-A467-A8DF6EE57C34}\InprocServer32\ = "C:\\Windows\\SysWOW64\\cbfsShellHelper20.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\88142E8D455B6FF44BA8458B76AF529E\ProductFeature msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\88142E8D455B6FF44BA8458B76AF529E msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{D8E24188-B554-4FF6-B48A-54B867FA25E9}\Dependents Mountain Duck Installer-4.16.2.22310.exe Key created \REGISTRY\MACHINE\Software\Classes\Installer\Dependencies\{D8E24188-B554-4FF6-B48A-54B867FA25E9} Mountain Duck Installer-4.16.2.22310.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Cyberduck.Bookmark\shell msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26C0AD76-8A71-445B-91C5-97F4B73E1991}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{B3AED949-ED84-432F-87CA-42AD0625021C} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{888B4BB4-CE31-4C7F-8693-E90B0E34EE5D} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{7F65F3AA-CDD1-4875-A467-A8DF6EE57C34}\InprocServer32\ThreadingModel = "Apartment" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\88142E8D455B6FF44BA8458B76AF529E\PackageCode = "D374B151D02F2764CAAD8DBF7FA2B77C" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{FA26A191-EF4E-433E-BD98-FB0D87B4C8A6}\ = "{FA26A191-EF4E-433E-BD98-FB0D87B4C8A6}" Mountain Duck Installer-4.16.2.22310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{0E3B2F5F-8AF5-4016-B64C-D01734329F13}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{6093F40E-856B-4CC7-BA9A-072D08AC5097}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Cyberduck.Bookmark\DefaultIcon msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DBE63233-DC1B-4360-94BE-16257112A298}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\191A62AFE4FEE334DB89BFD0784B8C6A\SourceList msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E1192D2-8667-4987-A464-824357FC4857} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888B4BB4-CE31-4C7F-8693-E90B0E34EE5D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{858C99A3-79F8-49B0-82DB-EB8FE97968C5}\InprocServer32\ = "C:\\Program Files (x86)\\Mountain Duck Shell Extension\\LiferayNativityPauseOverlay_x86.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{858C99A3-79F8-49B0-82DB-EB8FE97968C5}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\191A62AFE4FEE334DB89BFD0784B8C6A\SourceList\LastUsedSource = "n;1;C:\\ProgramData\\Package Cache\\{FA26A191-EF4E-433E-BD98-FB0D87B4C8A6}v1.0.35\\" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888B4BB4-CE31-4C7F-8693-E90B0E34EE5D}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3} MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{858C99A3-79F8-49B0-82DB-EB8FE97968C5}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{11436c5a-53fd-4391-ac55-5455d5e0e733}\Dependents\{11436c5a-53fd-4391-ac55-5455d5e0e733} Mountain Duck Installer-4.16.2.22310.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cyberduckprofile msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{26C0AD76-8A71-445B-91C5-97F4B73E1991}\InprocServer32\ = "C:\\Program Files (x86)\\Mountain Duck Shell Extension\\LiferayNativityMaliciousOverlay_x86.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{26C0AD76-8A71-445B-91C5-97F4B73E1991}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Cyberduck Connection.Profile\shell\open\command\ = "\"C:\\Program Files\\Mountain Duck\\Mountain Duck.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Directory\background\shellex\ContextMenuHandlers\MountainDuckContextMenus msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Cyberduck.Bookmark\shell\open\command msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\88142E8D455B6FF44BA8458B76AF529E\SourceList\Media msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{486FAE57-C473-4BC1-812B-BCA88F6CBAF1}\InprocServer32\ = "C:\\Program Files\\Mountain Duck Shell Extension\\LiferayNativityContextMenus_x64.dll" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{C508BFF9-B703-452D-B41D-21BA26A5B55C}\InprocServer32\ThreadingModel = "Apartment" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\191A62AFE4FEE334DB89BFD0784B8C6A\Assignment = "1" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{11436c5a-53fd-4391-ac55-5455d5e0e733}\DisplayName = "Mountain Duck" Mountain Duck Installer-4.16.2.22310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Dependencies\{D8E24188-B554-4FF6-B48A-54B867FA25E9}\DisplayName = "Mountain Duck" Mountain Duck Installer-4.16.2.22310.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{888B4BB4-CE31-4C7F-8693-E90B0E34EE5D}\ = "IVSMntNtfOverlayIcon" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{486FAE57-C473-4BC1-812B-BCA88F6CBAF1} msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{858C99A3-79F8-49B0-82DB-EB8FE97968C5} msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\191A62AFE4FEE334DB89BFD0784B8C6A\AdvertiseFlags = "388" msiexec.exe Key created \REGISTRY\MACHINE\Software\Classes\ftps msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{888B4BB4-CE31-4C7F-8693-E90B0E34EE5D}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{2E1192D2-8667-4987-A464-824357FC4857}\2.0\HELPDIR\ = "C:\\Windows\\Installer\\CBFFFFB.tmp\\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\\i386" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Mountain Duck.ProtocolHandler\shell\open\command\ = "\"C:\\Program Files\\Mountain Duck\\Mountain Duck.exe\" \"%1\"" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{F8C1B54F-4899-4BA9-9A09-0486BB929AF3}\Programmable MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{DBE63233-DC1B-4360-94BE-16257112A298}\InprocServer32 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.duck\Cyberduck.Bookmark\ShellNew msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Cyberduck.Bookmark\ = "Cyberduck Bookmark" msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1788 msiexec.exe 1788 msiexec.exe 1788 msiexec.exe 1788 msiexec.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 4920 vssvc.exe Token: SeRestorePrivilege 4920 vssvc.exe Token: SeAuditPrivilege 4920 vssvc.exe Token: SeShutdownPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeIncreaseQuotaPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeBackupPrivilege 3476 srtasks.exe Token: SeRestorePrivilege 3476 srtasks.exe Token: SeSecurityPrivilege 3476 srtasks.exe Token: SeTakeOwnershipPrivilege 3476 srtasks.exe Token: SeSecurityPrivilege 1788 msiexec.exe Token: SeCreateTokenPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeAssignPrimaryTokenPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeLockMemoryPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeIncreaseQuotaPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeMachineAccountPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeTcbPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeSecurityPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeTakeOwnershipPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeLoadDriverPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeSystemProfilePrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeSystemtimePrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeProfSingleProcessPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeIncBasePriorityPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeCreatePagefilePrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeCreatePermanentPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeBackupPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeRestorePrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeShutdownPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeDebugPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeAuditPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeSystemEnvironmentPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeChangeNotifyPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeRemoteShutdownPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeUndockPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeSyncAgentPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeEnableDelegationPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeManageVolumePrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeImpersonatePrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeCreateGlobalPrivilege 1952 Mountain Duck Installer-4.16.2.22310.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeBackupPrivilege 3476 srtasks.exe Token: SeRestorePrivilege 3476 srtasks.exe Token: SeSecurityPrivilege 3476 srtasks.exe Token: SeTakeOwnershipPrivilege 3476 srtasks.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe Token: SeTakeOwnershipPrivilege 1788 msiexec.exe Token: SeRestorePrivilege 1788 msiexec.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3004 Mountain Duck Installer-4.16.2.22310.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2308 LogonUI.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3704 wrote to memory of 3004 3704 Mountain Duck Installer-4.16.2.22310.exe 78 PID 3704 wrote to memory of 3004 3704 Mountain Duck Installer-4.16.2.22310.exe 78 PID 3704 wrote to memory of 3004 3704 Mountain Duck Installer-4.16.2.22310.exe 78 PID 3004 wrote to memory of 1952 3004 Mountain Duck Installer-4.16.2.22310.exe 79 PID 3004 wrote to memory of 1952 3004 Mountain Duck Installer-4.16.2.22310.exe 79 PID 3004 wrote to memory of 1952 3004 Mountain Duck Installer-4.16.2.22310.exe 79 PID 1788 wrote to memory of 2964 1788 msiexec.exe 89 PID 1788 wrote to memory of 2964 1788 msiexec.exe 89 PID 1788 wrote to memory of 2964 1788 msiexec.exe 89 PID 1788 wrote to memory of 2864 1788 msiexec.exe 90 PID 1788 wrote to memory of 2864 1788 msiexec.exe 90 PID 2864 wrote to memory of 2260 2864 MsiExec.exe 91 PID 2864 wrote to memory of 2260 2864 MsiExec.exe 91 PID 2864 wrote to memory of 2260 2864 MsiExec.exe 91 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Mountain Duck Installer-4.16.2.22310.exe"C:\Users\Admin\AppData\Local\Temp\Mountain Duck Installer-4.16.2.22310.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Temp\{42099E7D-86D1-43E5-8AB0-5879CBFAEC1C}\.cr\Mountain Duck Installer-4.16.2.22310.exe"C:\Windows\Temp\{42099E7D-86D1-43E5-8AB0-5879CBFAEC1C}\.cr\Mountain Duck Installer-4.16.2.22310.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\Mountain Duck Installer-4.16.2.22310.exe" -burn.filehandle.attached=728 -burn.filehandle.self=5642⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\Temp\{DE60234A-B487-465A-A87B-61AE99162DCB}\.be\Mountain Duck Installer-4.16.2.22310.exe"C:\Windows\Temp\{DE60234A-B487-465A-A87B-61AE99162DCB}\.be\Mountain Duck Installer-4.16.2.22310.exe" -q -burn.elevated BurnPipe.{BD24A2C3-1FC2-4809-BDFC-FB1ED868E764} {2EC90B59-6711-48E5-959C-B097677600BD} 30043⤵
- Adds Run key to start application
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1952
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:4920
-
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:21⤵
- Suspicious use of AdjustPrivilegeToken
PID:3476
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Adds Run key to start application
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 1533250ED38989B8564EC70F2D252D4D2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\System32\MsiExec.exeC:\Windows\System32\MsiExec.exe -Embedding B576890CADCFD666E690D63D49B967D3 E Global\MSI00002⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in Drivers directory
- Modifies Shared Task Scheduler registry keys
- Drops desktop.ini file(s)
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Windows directory
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\SysWOW64\regsvr32.exe" /n /s /i:"cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F" "C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\cbfsShellHelper20.dll"3⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Modifies Shared Task Scheduler registry keys
- Installs/modifies Browser Helper Object
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2260
-
-
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a0f055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2308
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
3Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
39KB
MD5f2ae7434cd34c62e2f9896d1a42250f5
SHA1e2572ff1419a67a9b6f866ac7411305a475d5e60
SHA25670eebd543e907ddbd229fdc545cfc65a6fb20d5a62c413d0079ff105e49d30a6
SHA512cce7a637a8e452d67f35230e8b56320072d364195e25e39255a62fbee7d5a05318bc9c1224e664c2b773f1d181563aab9f233a18961f892161d72dbe1a5c275a
-
Filesize
24KB
MD5b6af0de1c12162f5ccf5510649bdd005
SHA19cc1748a2c603f600e605b5ca7d9d7c54122097b
SHA256a0f17ce4fcf5a134fee5c0a33f6142071cf92e050a7f66a3d66734c2f8598950
SHA512eed86cf88685ecb9c5b75597b9451625c132c9bdcfca89c3e5dab06e2457beac018361019f756bebd342a41da3ee6ac9b27e905f4cb4b9040dd84791af2871a3
-
Filesize
1KB
MD5bbc0ba1b9ec8cea29dd25f59f61adcb1
SHA11e127079d412cb5ae0cf287bc06b06c34a52c1df
SHA256df5759d5a238bb0326c3d845bf3978478a19b4ba56eaf410a2bab8537839f904
SHA512fe5959e414f89dc161513d3888341ee816e508cc1ae81a0aed6ede4b539302021468a507e4e15844706640646724f1d5faa5ab510abdc70f7c6dee5b607e0d09
-
Filesize
1KB
MD5d7d3e2e6e8c04bb90ada930efa88ad21
SHA1b41bebed3387f85de1d1e983c7533992db124aa9
SHA2561302dfeec87d297f5a0b50df29bcfbaa3ca0a3e437997558ae0ffe01b13f03c5
SHA51255ddb83c64691cf668b395229b03f5f3a2e0c58ecbc228f1bf5db0c9986b135f81a475902c6ec5e4c9747bfd69fb5ea52010d7dea12110d691a878563a6d23c3
-
Filesize
2KB
MD56b01b9b380016879ffc82e79c2f404ca
SHA1a06308da9eeac6d594a87513be08a21a9938a121
SHA2566c14d81eaa7a9ca28d54e0df870245d539a9740e14c1c25997f04d12f9f41792
SHA512f4f9d4f8ff719546d4ef081bef4d061828e7c7da3b911fa54f8e189bc0b79fc90f53182465af3e4204ea620d73545d963d4f10cf91b80e62485d0333292970eb
-
C:\Users\Admin\AppData\Local\Temp\Mountain_Duck_20240902212950_001_Mountain_Duck_Shell_Extension_Installer_1.0.35.msi.log
Filesize4KB
MD5733e37ed11f0211dcb1939c214c16baf
SHA1479d99f016de0201b9096bbd49022306a209b7ef
SHA256c2200f0e758b3837c4375d3f3492137bc89aeced0f0cfbb05023b5d0cc741f1c
SHA51208c49495c269ea8a8376017f4fe27ee38f940fc624901b63791d4b2fb8a0e5cb57d82940eef53f391f727325eb824e8df862898ac78526aa71858dd8c1265aa3
-
Filesize
1.8MB
MD5883782085fb08b988c7fcca98c79e6ec
SHA160d69afc2a4cae97626e9f55e8fc07176038f26f
SHA2564824d6aab604f77d9c7316e90b17b9f9aa3ca1c010e33049073e776d56132f12
SHA512cebc1af39fbab516d6e39ad93708e3a704445854e812f37208a0be9d719267be67f6d8b14e72d334698aa5ec8966c89e947084adf1b66ed24b6a62a964f63819
-
Filesize
3KB
MD5bc2d54e7497adfed516338a21ef85ba2
SHA1ae8d1646725972e233cd8faa759876228ef7a822
SHA25665b033d1adce1b018bf1fbe79ef09bc6e4228cb27a463d34f38af65b516e864d
SHA5123c9fa29a3c57f37348ba58592dc899374671b6dcbc589ed0d95c733ed1e03058ee4c3ec7d0690e1b98175565de5158c71c5ab7f64654fe490d665c730307dfe4
-
Filesize
353KB
MD50e6ac83a34e3765ae6451b496563cc56
SHA10323babdcb89e5ded493105aac305dc79a469e8a
SHA256fadb0842f930ed95a6be2633551b66629f5a5b3a1ffdccb2d773c2a15507d80f
SHA5123853cab4dfb8ed3db3edbaf2ddf6050f9358f78775d680e4bf06aeb29d0ff32ecb287615f8c0cb2f68af6606ea52072a1208450be4301212951d02ed591ec1e0
-
C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\i386\SHA1\cbfspnpbus.inf
Filesize3KB
MD511e4acc1768e00c5eb7c2af487d046ec
SHA1638fe0fee068ebf893852b5c9cf0471a55a0c2ec
SHA2564860bb7ffe23fdd8ac7c0e2a40f078929bfe20ea20ede2b709741cee1e9eae12
SHA51206105370412723aadcb195770671d0f6a8a36bb597768df8c798c5c206cde11bffc6137a8e50c0711dacaebf139fee6c26357024eda5c881b340c63d9a77f0e1
-
Filesize
447KB
MD54280cd106a03bbf956066a03758edf70
SHA1ed48bbb9287fd479413e205c085cf2e3330ec83e
SHA25609f491b016bfab7241be2370d5837a6dcb9f5203cdc19155727346843c2a3e20
SHA5128f8dcf01d63bf1033735eabe0ebb7c56925b16e3e1d3cc754c9f7cd36c46ef260452dd3e5b396bada10b98b7d523e54cb044b1f23de4a603adbda93e40541bf6
-
C:\Windows\Installer\CBFFFFB.tmp\cbfs20-15139B6C-4B6C-49C4-A3D8-12712767F13F\x64\cbfsShellHelper20.dll
Filesize277KB
MD590cc91099b32c3e1e712f325d02b25a6
SHA13650ba2e8ab165693afdf06b254c5728a85d2be0
SHA256ef430cd70cd564af7d88e964e73e7e16ed3969b320f63b1ffe64b2516fc39a51
SHA5124f61d746daa385c53d0ca2c19a2602d16f8465eccf56fe6829dc5dcc99c5527bd73d0a03c01c0cdb6cc6e68814bb6c995531debb132103b4c6d77e5ccf119d85
-
Filesize
3KB
MD51d992ea7dd85d14453fce31efccd880b
SHA1158f0140bb1511d22845177f7995cc2a153be819
SHA256586cc28d61aed1819c321014fa757623693d49b327ecbae3bd77d288850de84f
SHA512435b5a496c452082ba8782c4d299e8d0d262b28c98356170f5eba5db0d6bdef79037781a9d862d0dad5620deb3310d96f9f4ce62feff705985abf1f6715e5215
-
Filesize
188KB
MD5873fd0ba5db50aabcb44b6b6528a5c8a
SHA1c696fd2bc8f81b796936cba5082a6f331352ebff
SHA256c45fdc4445389289627621895c919d40f5107656b2ec8be6ea138f0193d8f158
SHA512d869af4bf41c0cb89bf7bf56e98a80c28b494ee9659e90b740ecb8e87fbda2b9e7f99f4280a72a4d7f15782fbfd997ad51694345e0969e52d77a9763893840b3
-
Filesize
177KB
MD508abed40e2d8f1fc527bbbf547517422
SHA17217941e7344cb4818a579699af2df966f794182
SHA256bd2bc95276795c3381ba99f946da68a0b83c1fcc2073583a50023fcef5debad5
SHA512c3ac77eacdc55e85b9d21bedd3308b5ae56f6e708942f2053b381a7ce5eea6c1ba7b52d392256447c768ad8926590af8a71002e293964d4b978c108e68a7109e
-
Filesize
234KB
MD5ee248d3dd120e7f40d32019514c5fe73
SHA1b6085a4fdd9ce834a7d73b42ce8846a80d0fc21b
SHA25686ada378311714ac96700fa0000bae824342ceae6382ff8bee203b8af8f89b26
SHA512a888b3f9dc63e57a0bc85be60193200d04e89006abf07eac71258a3107f72b13748b6a40c0eb1048dbf7f9179845c0dd4f53fc9786b847428cfd3fb4fe9a93e6
-
Filesize
5.4MB
MD5a2042c1e7e717ed460c237442c74b99b
SHA1258bacd2bce955d03274499328d272399a184e43
SHA256e5eb8ff9f5e6ae69f3296ac65cba0e9b37fdb78a35fdff1fe235d8dbded9e76e
SHA5124a24c3cfc7c95173b919ddfb449e65a082bd73b4146d6e218a02f417c9a230ceaaf1012666472c4a973e8a63e693575a23b329edc53bfec4966a864d24d9c6b3
-
Filesize
222KB
MD5ced5e92b76d4901ba973c637d88968eb
SHA1ec51a22bfa16f8b611affcbad7d4d8e9a9670679
SHA2568f80a5ac0441a362717fec1a8f33346ecabdff2eb115bb9471066946f96085a0
SHA512ab2fccc3e551c5217bc596f3fdd52f3289f08dd19418f56ecd13af22920fe112e971bb118af16c37cc7161defb4eebe231f0aee411fbe867742810497b92895c
-
Filesize
13KB
MD56b9821a194201368bf2e470b5b6b965f
SHA19154f1a446f4d15788e96e952de26f686c5e938c
SHA256ca29ff3813a3fdbe3afe1e3afe4dd3551182e780b54ad8bb18680d83ec2444cc
SHA512bedf84ba6a0476194db19cf849cf383d0d3b2c6c148b0cd6b7e5aef82d1f00d984ad7f1bf0da35d7bb9765ccee0242582d61c33ac628fd40122f978925d8a550
-
Filesize
989KB
MD578298fa6a6adc1f977ecf20e3471532d
SHA198450f9323099e09e4b70a082f4f0406ea9aa82e
SHA256da43cd2d778e1824b0206c628950bcafa26e2e99ec46b4f9eb55ae10e81bc4b0
SHA512fbe4f045ac42d3fe514d8e0f7a45ea232068d16b81bd033722d92003d0a9da04805afc14ad198508fda0648e5677884b38e97b2c464b24ac9e9afc3ac44ab8f5
-
Filesize
6KB
MD59993dfa5ceb1cba0076e4c90edcbcbcc
SHA1a41d5e9cf0a443c27bf998045e81269bd94fea41
SHA2566bde0e21b3f61c57ae6c7aba847daa041e155c63e98d76e253ad21b1a6dc376f
SHA51226e87bd15bec1b5f84da5e5a53160393ce08c2849fa4bd2afdab0616fb96992d56e73897e0a548cf176ffd95bbc6521837b97230f9a4a7ec6ec7ad9f1b1f3c60
-
Filesize
150KB
MD5182e4c893122ce2fb8cdfc3d3b30b288
SHA1a4ced35d92e74e4af61823c23f52c65020e74ad3
SHA256f7534329d166508dc5f7662f32c09ca70cb3d80fdf6c5f5822616f81c390a3a7
SHA5120fe880a8f43c175a531f5abe9b694e8b792f078674661ffa12574b775cd75cd43645168c0cd50b27bb7ed0a06f615163465ad07d181678ee275ca1366e81d83e
-
Filesize
9KB
MD58314bce64d120f62cdb003046ec650f8
SHA1d92b50243e23152251a4e9c156d8ac4effaaff2d
SHA25624626aae83b865fd06b479687d939263aec015d53f2b1cc0db7d3705dc58ff5d
SHA512bcba80ab4bcacdf4c374fbfcc161465fa45018e883d5ed1c7bfd2d04169ab42e1638d53f096138af72aa1ebe89308cf8deb1471a2c244e9261ffd29080657642
-
Filesize
205KB
MD530803bdcda5083de8bb9fb5cca486412
SHA165bcf49bc81595c57b769c11f7097b9bf2968fb6
SHA256aa1dd28cc0450dcf38761e4e63bd029c46c66a9dc907e5a2a4d1b2e4261c2dcd
SHA5126eb3895f137ce51f480a7eed90a79beb354b1cd4ec708194398ac787f99462c92f8798b7c5762dda8ea6a66dfe184031a2593a257a5b243a17f78dac4289276e
-
C:\Windows\Temp\{DE60234A-B487-465A-A87B-61AE99162DCB}\Mountain_Duck_Shell_Extension_Installer_1.0.35.msi
Filesize1.9MB
MD50df79281f0b2cda2653e74dc1bbb122e
SHA16e2bce363cfbf257b362edac66a54ed3931418d2
SHA256ed58bde723c0f4b64686d295c13f0dbc2b813db0868b58279e22456f2db4bc51
SHA51204dd4b80ad498c6f2f777e84af439833260157ee8949e098b46f17149931b73bbc63a8bcdb94764f3bdc5f570517df1e7db3aed62595417212cba13ea6251d37