Overview
overview
7Static
static
30 Mouse De...ay.rar
windows7-x64
30 Mouse De...ay.rar
windows10-2004-x64
30 Mouse De...ay.reg
windows7-x64
10 Mouse De...ay.reg
windows10-2004-x64
10 Mouse De...er.reg
windows7-x64
10 Mouse De...er.reg
windows10-2004-x64
10 Mouse De...V2.reg
windows7-x64
10 Mouse De...V2.reg
windows10-2004-x64
10 Mouse De...ay.reg
windows7-x64
10 Mouse De...ay.reg
windows10-2004-x64
10 Mouse De...Me.txt
windows7-x64
10 Mouse De...Me.txt
windows10-2004-x64
10 Mouse De...es.png
windows7-x64
10 Mouse De...es.png
windows10-2004-x64
30 Mouse De...on.exe
windows7-x64
30 Mouse De...on.exe
windows10-2004-x64
30 Mouse De...GS.png
windows7-x64
10 Mouse De...GS.png
windows10-2004-x64
30 Mouse De....5.exe
windows7-x64
70 Mouse De....5.exe
windows10-2004-x64
7$PLUGINSDI...md.dll
windows7-x64
3$PLUGINSDI...md.dll
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
3$PLUGINSDI...er.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...al.ini
windows7-x64
1$PLUGINSDI...al.ini
windows10-2004-x64
1$PLUGINSDI...rd.bmp
windows7-x64
3$PLUGINSDI...rd.bmp
windows10-2004-x64
7Analysis
-
max time kernel
140s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 02:33
Static task
static1
Behavioral task
behavioral1
Sample
0 Mouse Delay + Input Delay.rar
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0 Mouse Delay + Input Delay.rar
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
0 Mouse Delay + Input Delay/0 Mouse Delay.reg
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
0 Mouse Delay + Input Delay/0 Mouse Delay.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
0 Mouse Delay + Input Delay/Delay Reducer.reg
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
0 Mouse Delay + Input Delay/Delay Reducer.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
0 Mouse Delay + Input Delay/Input Delay V2.reg
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
0 Mouse Delay + Input Delay/Input Delay V2.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
0 Mouse Delay + Input Delay/Input Delay.reg
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
0 Mouse Delay + Input Delay/Input Delay.reg
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
0 Mouse Delay + Input Delay/TimerResolution/Read Me.txt
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
0 Mouse Delay + Input Delay/TimerResolution/Read Me.txt
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
0 Mouse Delay + Input Delay/TimerResolution/TimerResolution Properties.png
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
0 Mouse Delay + Input Delay/TimerResolution/TimerResolution Properties.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
0 Mouse Delay + Input Delay/TimerResolution/TimerResolution.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
0 Mouse Delay + Input Delay/TimerResolution/TimerResolution.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
0 Mouse Delay + Input Delay/XMOUSE SETTINGS.png
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
0 Mouse Delay + Input Delay/XMOUSE SETTINGS.png
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
0 Mouse Delay + Input Delay/XMouseButtonControlSetup.2.20.5.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
0 Mouse Delay + Input Delay/XMouseButtonControlSetup.2.20.5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win7-20240708-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win7-20240708-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/ioSpecial.ini
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
$PLUGINSDIR/modern-wizard.bmp
Resource
win10v2004-20240802-en
General
-
Target
0 Mouse Delay + Input Delay/XMouseButtonControlSetup.2.20.5.exe
-
Size
2.9MB
-
MD5
2e9725bc1d71ad1b8006dfc5a2510f88
-
SHA1
6e1f7d12881696944bf5e030a7d131b969de0c6c
-
SHA256
2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818
-
SHA512
62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39
-
SSDEEP
49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1928 XMouseButtonControl.exe -
Loads dropped DLL 10 IoCs
pid Process 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 4780 XMouseButtonControlSetup.2.20.5.exe 1928 XMouseButtonControl.exe 1928 XMouseButtonControl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XMouseButtonControl = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe /notportable /delay" XMouseButtonControlSetup.2.20.5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\ChangeLog.txt XMouseButtonControlSetup.2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\X-Mouse Button Control User Guide.pdf XMouseButtonControlSetup.2.20.5.exe File opened for modification C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\changelog.txt XMouseButtonControlSetup.2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe XMouseButtonControlSetup.2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe XMouseButtonControlSetup.2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll XMouseButtonControlSetup.2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll XMouseButtonControlSetup.2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\License.txt XMouseButtonControlSetup.2.20.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XMouseButtonControlSetup.2.20.5.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop\LowLevelHooksTimeout = "1000" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\Desktop XMouseButtonControlSetup.2.20.5.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\ = "X-Mouse Button Control Application or Window Profile" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\ = "X-Mouse Button Control Language Pack" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open\command XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcs\ = "X-Mouse Button Control Application or Window Profile" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\ = "X-Mouse Button Control Settings" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbclp XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open\command XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbclp\ = "X-Mouse Button Control Language Pack" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\DefaultIcon XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcp\ = "X-Mouse Button Control Settings" XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /profile:\"%1\"" XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /install:\"%1\"" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcs XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcp XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\ = "open" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\ = "open" XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\DefaultIcon XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\DefaultIcon XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\ = "open" XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open\command XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open XMouseButtonControlSetup.2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /import:\"%1\"" XMouseButtonControlSetup.2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open XMouseButtonControlSetup.2.20.5.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 XMouseButtonControl.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4900 msedge.exe 4900 msedge.exe 4492 msedge.exe 4492 msedge.exe 4164 identity_helper.exe 4164 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 1928 XMouseButtonControl.exe -
Suspicious use of SendNotifyMessage 25 IoCs
pid Process 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 4492 msedge.exe 1928 XMouseButtonControl.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1928 XMouseButtonControl.exe 1928 XMouseButtonControl.exe 1928 XMouseButtonControl.exe 1928 XMouseButtonControl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4492 wrote to memory of 1588 4492 msedge.exe 99 PID 4492 wrote to memory of 1588 4492 msedge.exe 99 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 1452 4492 msedge.exe 100 PID 4492 wrote to memory of 4900 4492 msedge.exe 101 PID 4492 wrote to memory of 4900 4492 msedge.exe 101 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102 PID 4492 wrote to memory of 2312 4492 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay\XMouseButtonControlSetup.2.20.5.exe"C:\Users\Admin\AppData\Local\Temp\0 Mouse Delay + Input Delay\XMouseButtonControlSetup.2.20.5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
PID:4780
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x641⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff8099646f8,0x7ff809964708,0x7ff8099647182⤵PID:1588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3216 /prefetch:12⤵PID:1772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:12⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵PID:4768
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4676 /prefetch:12⤵PID:3936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:1336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5396 /prefetch:12⤵PID:1380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,17379993943640176281,3631849023425710035,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5392 /prefetch:12⤵PID:5064
-
-
C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe"C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1928
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1708
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1336
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD580d5f32b3fc515402b9e1fe958dedf81
SHA1a80ffd7907e0de2ee4e13c592b888fe00551b7e0
SHA2560ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a
SHA5121589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0
-
Filesize
1.7MB
MD5bb632bc4c4414303c783a0153f6609f7
SHA1eb16bf0d8ce0af4d72dff415741fd0d7aac3020e
SHA2567cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8
SHA51215b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5
-
Filesize
1.0MB
MD5d62a4279ebba19c9bf0037d4f7cbf0bc
SHA15257d9505cca6b75fe55dfdaf2ea83a7d2d28170
SHA256c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0
SHA5126895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323
-
Filesize
152B
MD50446fcdd21b016db1f468971fb82a488
SHA1726b91562bb75f80981f381e3c69d7d832c87c9d
SHA25662c5dc18b25e758f3508582a7c58bb46b734a774d97fc0e8a20614235caa8222
SHA5121df7c085042266959f1fe0aedc5f6d40ceba485b54159f51f0c38f17bb250b79ea941b735e1b6faf219f23fe8ab65ac4557f545519d52d5416b89ad0f9047a31
-
Filesize
152B
MD59b008261dda31857d68792b46af6dd6d
SHA1e82dc88e2d1da2df7cb19d79a0346b9bb90d52b3
SHA2569ac598d4f8170f7e475d84103aead9e3c23d5f2d292741a7f56a17bde8b6f7da
SHA51278853091403a06beeec4998e2e3a4342111895ffd485f7f7cd367741a4883f7a25864cba00a6c86f27dc0c9ce9d04f08011ecc40c8ae9383d33274739ac39f10
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize168B
MD57b4f1061c85e1afbfaf9661aa56331db
SHA1c42eeea2b37d47fc0281b414c295d7a80a757176
SHA2563417fd83cccd5b8789d823b48e302acba734f400ed52733fd138279248737053
SHA5121dc6dd101ff785b24bebc3bbff7d424cab0d505639d5545b562900e9e3f18b3c73e97bb9cd61bccb7cf010816a8c0a28d5074b2273c9f664e6ab7f5a07b3ac39
-
Filesize
1KB
MD54a21bbdd32b22845a01d0bffb6aac08e
SHA1fc82ac126afab1c20bb2e1a64c44f16ca1460023
SHA256343b6e828b3231013ea2253d64f176baf0b4269b6ef7a1e044f7eaf45a6f6de4
SHA51224e1d20c148e8eef70b435fc22e1cc44bed96d1601884f60e98d3ad48ccb83c6ab4678cb0632b7041d60c40762e178840a2c044774c4b6095c4f7f8b26e7caa7
-
Filesize
5KB
MD54d40ae464a18aefadd474b57e1196756
SHA16c3e39f4210f6c14112ed54fe39ff6d51b24dee7
SHA25633911ffc95f317a0d9791273762852ae93c99e5a781c236cb2d217a5aa2d35fb
SHA5125b3b88c68dd1020d6896ad22ecc23a961524dfaaa6d0c6529cfd273ddb8021b05a7077ef0baed5e734d4d2d65a6ba24a7bc0261c3176739601da67a6e3338ec0
-
Filesize
6KB
MD51f1e68f12710ab205e9c96ff9f1b363c
SHA136a783d54797b1601c496a75f86d5c66151f50d6
SHA256870c77438e918bf0c51f4145f143e4e312ac60a1b43534298b2e56c6db235fe8
SHA51246c551f97eea70603a446664dfb50f0d644cccc273c960d9f54a4d16f5a7cf0bd247c9cdc33a9d6d355ca584c4e5e73322e0eec8c517b65ce597edbef260e036
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD56062b76bbf7dde987348441ef8cb90a3
SHA107ee4f0830754825b4ca4907cbd20095d403a913
SHA256c31c4123bad14c4494a02064c9427941a67942c9efb1c94b17139e145442b5c6
SHA51206615bf0225be1cf465745037f0799e7ab7604312c2aa7ae9a5ec45e8d02410d8dfdabbf7922fad960b4f420dfd21c895be7e36ee2f7fcf07352a3529ee9bac5
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
7KB
MD586a81b9ab7de83aa01024593a03d1872
SHA18fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be
SHA25627d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115
SHA512cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
696B
MD5ae744f4ec1e83364f8cba1374ccc8c13
SHA1392119fac222be6668d86a3feb550cb76ec60aac
SHA2569885ed989aebcc485e9782f266295e532424329b12e40edcad3fd41db2608865
SHA512dbdbdbe4a2d7b9804c46d809737184120a96d14a898005660c013335aa41b5f098448b79f26715637c51d985961735e2b186e0f55c89199322a5c01889fadb7f
-
Filesize
709B
MD5d5352df5e7fea39a28f4c10901faf1dd
SHA1ccb4c786d53a8d2d244f106743eb471ca55fb3af
SHA2568ff8d8793d4363eeab9df30758767ad3865033d629d8fa773f3f2be785f4fc5f
SHA5120aa605a89cdfc3537d55998594cee2de7a03ac177d6bc7f024d9f1e35c7f33e11fdede619bd1e54780c8de3f6acee8393263ed858bed53ca722edade8eb89c89
-
Filesize
739B
MD515472c6bbbaea15cc52e836b795b3f7e
SHA18669cbc9c234a3b063e242d6fcf4bf8fc2f286da
SHA2568c8c5dc34dcfbb1c03a3e8ac7b433b6a75018a1a801eb5952e0c714c95f3b365
SHA5125e19adcd230d380a9008be78edd6841904f0e908caaf1797ac86382b8c429e19dac6d07eb9751e8cd86645520625726f8a80e667b04eec4e7a7a1158a898ebac
-
Filesize
9KB
MD5f832e4279c8ff9029b94027803e10e1b
SHA1134ff09f9c70999da35e73f57b70522dc817e681
SHA2564cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061
SHA512bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d