Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
7Static
static
3cdba0935f9...0N.exe
windows7-x64
7cdba0935f9...0N.exe
windows10-2004-x64
7$APPDATA/G...ay.exe
windows7-x64
1$APPDATA/G...ay.exe
windows10-2004-x64
3$APPDATA/G...se.htm
windows7-x64
3$APPDATA/G...se.htm
windows10-2004-x64
3$APPDATA/G...er.htm
windows7-x64
6$APPDATA/G...er.htm
windows10-2004-x64
6$APPDATA/G...x.html
windows7-x64
3$APPDATA/G...x.html
windows10-2004-x64
3$APPDATA/G...AQ.htm
windows7-x64
3$APPDATA/G...AQ.htm
windows10-2004-x64
3$APPDATA/G...ai.htm
windows7-x64
3$APPDATA/G...ai.htm
windows10-2004-x64
1$APPDATA/G...er.htm
windows7-x64
3$APPDATA/G...er.htm
windows10-2004-x64
3$APPDATA/G...rs.htm
windows7-x64
3$APPDATA/G...rs.htm
windows10-2004-x64
3$APPDATA/G...ew.chm
windows7-x64
1$APPDATA/G...ew.chm
windows10-2004-x64
1$APPDATA/G...ht.htm
windows7-x64
3$APPDATA/G...ht.htm
windows10-2004-x64
3$APPDATA/G...hv.chm
windows7-x64
1$APPDATA/G...hv.chm
windows10-2004-x64
1$APPDATA/G...e.html
windows7-x64
3$APPDATA/G...e.html
windows10-2004-x64
3$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDIR/fct.dll
windows7-x64
3$PLUGINSDIR/fct.dll
windows10-2004-x64
3bin/IeSear...er.exe
windows7-x64
3bin/IeSear...er.exe
windows10-2004-x64
3Analysis
-
max time kernel
114s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 04:48
Static task
static1
Behavioral task
behavioral1
Sample
cdba0935f95f8e97ffadb50d510ace60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cdba0935f95f8e97ffadb50d510ace60N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$APPDATA/Genieo/Application/TrayUi/bin/gentray.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$APPDATA/Genieo/Application/TrayUi/bin/gentray.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$APPDATA/Genieo/Application/license/Apache log4j 1.2 - Project License.htm
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$APPDATA/Genieo/Application/license/Apache log4j 1.2 - Project License.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$APPDATA/Genieo/Application/license/IE HistoryView Freeware Internet Explorer History Viewer.htm
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$APPDATA/Genieo/Application/license/IE HistoryView Freeware Internet Explorer History Viewer.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$APPDATA/Genieo/Application/license/JDIC_Plus_index.html
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$APPDATA/Genieo/Application/license/JDIC_Plus_index.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$APPDATA/Genieo/Application/license/JDOM_FAQ.htm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$APPDATA/Genieo/Application/license/JDOM_FAQ.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
$APPDATA/Genieo/Application/license/JavaMail API Reference Implementation Project Kenai.htm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
$APPDATA/Genieo/Application/license/JavaMail API Reference Implementation Project Kenai.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
$APPDATA/Genieo/Application/license/Launch4j - Cross-platform Java executable wrapper.htm
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
$APPDATA/Genieo/Application/license/Launch4j - Cross-platform Java executable wrapper.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
$APPDATA/Genieo/Application/license/MozilaHistoryViewbrowsers.htm
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$APPDATA/Genieo/Application/license/MozilaHistoryViewbrowsers.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
$APPDATA/Genieo/Application/license/MozillaHistoryView/MozillaHistoryView.chm
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
$APPDATA/Genieo/Application/license/MozillaHistoryView/MozillaHistoryView.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
$APPDATA/Genieo/Application/license/SQLite Copyright.htm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
$APPDATA/Genieo/Application/license/SQLite Copyright.htm
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
$APPDATA/Genieo/Application/license/iehv/iehv.chm
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
$APPDATA/Genieo/Application/license/iehv/iehv.chm
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
$APPDATA/Genieo/Application/license/license.html
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
$APPDATA/Genieo/Application/license/license.html
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win7-20240903-en
Behavioral task
behavioral28
Sample
$PLUGINSDIR/KillProcDLL.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
$PLUGINSDIR/fct.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
$PLUGINSDIR/fct.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
bin/IeSearchProvider.exe
Resource
win7-20240903-en
Behavioral task
behavioral32
Sample
bin/IeSearchProvider.exe
Resource
win10v2004-20240802-en
General
-
Target
cdba0935f95f8e97ffadb50d510ace60N.exe
-
Size
482KB
-
MD5
cdba0935f95f8e97ffadb50d510ace60
-
SHA1
22940e1590aaa949c23faeaf02c46c0e1c8c9d6a
-
SHA256
af8b500428ae1502c2b6c3ed6f91714b873f8c4f418847cd234fb2b9e2b5a0c2
-
SHA512
d6428c70a44b77ad441ecd806a80e5c4f56400cc41e6675598f86d467b3ec6870787d0304dbe183a6e7f510e869f54c12081db67d58f685d62e11cd8c0565f2e
-
SSDEEP
12288:ZpG3lMqLngPixjkRGAy4EkqDkJE+FUsr0v:ZSMqLgPilOytc2cLr0v
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2792 gentray.exe 2692 genupdater.exe 276 genupdater.exe 1616 updater_uninstall.exe 1764 Au_.exe 2008 gentray.exe -
Loads dropped DLL 18 IoCs
pid Process 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2692 genupdater.exe 2692 genupdater.exe 2692 genupdater.exe 2692 genupdater.exe 2692 genupdater.exe 2692 genupdater.exe 1616 updater_uninstall.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\GenieoUpdaterService = "\"C:\\Users\\Admin\\AppData\\Roaming\\Genieo\\Application\\Updater\\bin\\genupdater.exe\" -wait 5" cdba0935f95f8e97ffadb50d510ace60N.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\GenieoSystemTray = "\"C:\\Users\\Admin\\AppData\\Roaming\\Genieo\\Application\\TrayUi\\bin\\gentray.exe\"" cdba0935f95f8e97ffadb50d510ace60N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gentray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cdba0935f95f8e97ffadb50d510ace60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language genupdater.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gentray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language updater_uninstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Au_.exe -
NSIS installer 2 IoCs
resource yara_rule behavioral1/files/0x000500000001a4c3-507.dat nsis_installer_1 behavioral1/files/0x000500000001a4c3-507.dat nsis_installer_2 -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "431760037" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{671C03C1-6C0B-11EF-ABAB-F245C6AC432F} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes gentray.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb0100000045c0dde48c11474f81d9a2c02be4ea2200000000020000000000106600000001000020000000582f4373062b8142348a94473ebfad49946d4c9606427dd34d187274153bb1b8000000000e8000000002000020000000e1ae617553ec664a8b752f7159727ddedc616c8cc22c13131e38775142e91fd32000000027e04e7a2c90338532b5530873767d6a2470b5d5ff922c6ea2ab5d37f745655a40000000519b9a6d6bf77e6e1bed3b6ad965426e580c59372863eb67806ee6433f7111dae167846d81df47e229966d6aeb95e88e00061a8202d78fe47ad1a2f5e3b0dde0 iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 60aec03b1800db01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main gentray.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 2692 genupdater.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe 2792 gentray.exe 2792 gentray.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe 1764 Au_.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 1644 iexplore.exe -
Suspicious use of SendNotifyMessage 7 IoCs
pid Process 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe 2792 gentray.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1644 iexplore.exe 1644 iexplore.exe 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE 1604 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2792 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 31 PID 2848 wrote to memory of 2792 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 31 PID 2848 wrote to memory of 2792 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 31 PID 2848 wrote to memory of 2792 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 31 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2848 wrote to memory of 2692 2848 cdba0935f95f8e97ffadb50d510ace60N.exe 32 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 276 2692 genupdater.exe 33 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2692 wrote to memory of 2044 2692 genupdater.exe 35 PID 2044 wrote to memory of 1644 2044 rundll32.exe 36 PID 2044 wrote to memory of 1644 2044 rundll32.exe 36 PID 2044 wrote to memory of 1644 2044 rundll32.exe 36 PID 2044 wrote to memory of 1644 2044 rundll32.exe 36 PID 1644 wrote to memory of 1604 1644 iexplore.exe 37 PID 1644 wrote to memory of 1604 1644 iexplore.exe 37 PID 1644 wrote to memory of 1604 1644 iexplore.exe 37 PID 1644 wrote to memory of 1604 1644 iexplore.exe 37 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 2692 wrote to memory of 1616 2692 genupdater.exe 41 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1616 wrote to memory of 1764 1616 updater_uninstall.exe 42 PID 1764 wrote to memory of 2008 1764 Au_.exe 43 PID 1764 wrote to memory of 2008 1764 Au_.exe 43 PID 1764 wrote to memory of 2008 1764 Au_.exe 43 PID 1764 wrote to memory of 2008 1764 Au_.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\cdba0935f95f8e97ffadb50d510ace60N.exe"C:\Users\Admin\AppData\Local\Temp\cdba0935f95f8e97ffadb50d510ace60N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe"C:\Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2792
-
-
C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe"C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe"C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\bin\genupdater.exe" -wait 3603⤵
- Executes dropped EXE
PID:276
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" url.dll,FileProtocolHandler http://userfeedback-genieo.appspot.com/installfail.jsp?errcode=140000073⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://userfeedback-genieo.appspot.com/installfail.jsp?errcode=140000074⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1644 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1604
-
-
-
-
C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\updater_uninstall.exe"C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\updater_uninstall.exe" /S -skip_check true3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" /S -skip_check true _?=C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\uninstall\4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Roaming\Genieo\Application\TrayUi\bin\gentray.exe"C:\Users\Admin\AppData\Roaming\Genieo\Application\Updater\..\TrayUi\bin\gentray.exe" -kill5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a7960379938182bea639733f42fe618a
SHA15834217d9bbfc44bca6b86cab46380a333214935
SHA256d54cd36430a87e8aa93ec218b8934374e36e0646a55cbd32d5103a3e9c0806f9
SHA5122cab28fe58709eea8c21a576a7f210146c9ea2fa27be43eec9e1ffd48f2c78f04dc08660af2a01694374393359bd4a49757fbabe3c94854e7dfb72463cb565f6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5066de2cf726563b2735928ddcd98ac94
SHA1357992ed4402797156be8c1b776993aecda83817
SHA2562f1a2bdb3ff3b1f69c99c61cbe0aaccc9e284a959252e7ae66e42fb79b99e20b
SHA512620c740fff01390fa0c5aafc1e7f0e9180164fa4103d9a0d39992938667de0e805b811ecdb69e5275b3bd397c579674c8cc4960069596a919222ae68386f0837
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a6d3412f8f5916b3ce398c8f034e4b9b
SHA164abf4318a088829901baa669c7e6b7ee226ea0d
SHA25602d372b02ed519822bbd24f02090c6d740f89f4cb3a60c3fabb14667b8ded4c8
SHA5125df81dd2efef94a178fba79c24a2977cdb85003202db4bc5d1f0571f6867a00dee732b6929af43624002dd4c246e0d4febec9723f04f598fc4828c550ecfe6e9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531faa90d333e250e25d7e7c9fe2e6aa4
SHA1bef038888635e4138ba6c7d6effd908a5a2b1d46
SHA256c08c12334e7270aca9a829cf094fa6ae23e783fb8b2965a4cae42375bcdd9576
SHA512e4f35a0cf50365d99c2b4a960f966336c862d0d1f0918417c499f401897eb7825b654851524ba9024845d757ca0de725f9541f1ff0541c750670f160250db024
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5003eded262b468d05cc601693fbb879b
SHA1f227ea5c920940c6e623785e370248315c96c090
SHA256ecc5b3f9041d5776a8a845aa25f7b44cfc28a33386331f0b7c8b6151da5f0517
SHA512b4dcc1cae81c00c75c1a1cad9bab5c380762d853808494f648d97815f1cddcae4859d6b7137e3c8909b3ee546c014f7acdeb4e3d34bf574ad325da7b31ef90f0
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51352a99d3d8fc8c6384496151addffcb
SHA1ef591b2269e0d0ede870795ca38bdb54b9f36562
SHA256d0138de28b067532185afd45c08eeb481fb9207cc2bfb68191519b8a7026a88e
SHA512cc678afaa95cba864a380c552b916d2a2b3a770afea9bcd2bf4906982221e6f5d44e8b9ee5ca2ad7fd767da51caff68b8dfba6a6a43eab157a995c174f74dd76
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5277a09459894c39afd9b9366f4f02da5
SHA152f07168eb26ee23d8414af3f31298a435c33ab6
SHA2566babfed2ee00c5bde455de16e0dc2a46075e2d8f4585602235650b11e6a05306
SHA51291ec2162ed106f60a0d4bfaa7cc78c41d14841bdc1e9823f7cd769815c45cd9860bcd1f453aa30db9b6876c8c8a485e4dd46961a125a10464d0d090efbeaece9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e71981fb50e8ed4f51c053760f2eae6b
SHA1dd2bf84909c612c20ec3319a7e37989a5f05b83a
SHA256753cdff87deff9de9fd5c38926c1c39e7b74ee1101391ac6e1bd3a2567deb78a
SHA51292411c2abfd843bc90e8364346c7ef77f9ec16a9e46209d9415fc8f0ecd1df49e1fce352a7597ad4dd71e4deb7136a952d6073afd0f3092926b0ce2afa023f46
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599372a815142d03cd018d58d0bd334ec
SHA1973c50fdf7eda61d4ffbe44d59a43cf90cae2f43
SHA25690e2b6d40b9dd9c8cf4a889c9e732f74a373c72c811337fd41950a039a1999de
SHA5125759395508d8e382ffe7f7f44a4e9e8701209509f153a07c4f97862bad3ae681a833466198014c63a21241719cea7b21f1ccd5aa22b6c7782b1aeb4eb7ca6d85
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51316844df7ba3c8dc4f6c59548df5fbc
SHA1c2fa3d69c404fa402ab00c48787d054e7a91a094
SHA256f22cf86eb072ef2222f3b2e63f3e1d8934d185c9c743a9779a2e9b801ad40259
SHA512526ad92d475e9224a330332c35e952dc27d9c57acf4fe8813425be477db47ebb9029920445e3a0b069aaadabc87c0f2668c80af302ad79272c542c7e45ac3144
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b53fa41afe0fb461bbbf68c1346a3cea
SHA13f90e65c64ecf56dc72d77507642867810890411
SHA2568ab0665f3060b971467adcf91b1c89f30a9c1e219ec65bfcde40fe7c221d6dc3
SHA512137efb88965d413cdd51d4624d097a182feaae63ac680fd44289f1b523acee3abb2d3838cad1df17b4e031f55ba1eb0f53439ee52ca06e8c5deee9672da94255
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d7a0c6f0cc7854d986347e8c86ed0311
SHA196794a8b163fb835c3e4b6aa3f386a190f1d9e17
SHA25662a0340c8a87a9f077874968cf1212a0c8800b36fc85b65e53580372eb1f9234
SHA512e0f21b0f2e1619c548ba65fdc939a133555cf33e0f3956344ac88569326aeb6a7413e1ff3dc32eba6f12f3ee650dc387850004f91f451619a268db55ae132c10
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5704302562574822fabea8d7173641194
SHA1f49ff23ec1e313c804bce29249bbf055f2e8982b
SHA256fdca04ab05df45f65cc8898b73c235bccc00ca29d812e94522dddc716fa8c937
SHA512814095e66b160908d027aec286efe8168e505559b38849d339a046caa1fd5a8fbef1c8cc386015560e0ee4151ad0457032311046b8398c60511f8f2897e5d232
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b6ed941c5a120777c9f3347e34aa9ce7
SHA113b6a02b93e63e72f399b2c331a4f4f0bcf40958
SHA256535402296416952ee5b1218a18167da6d0e116a1a83e433ddd13d6e27110dbfd
SHA51227b4e3694a589f5600c0fc6547b8abaa167678bb29b236b6646a97a19c41cf17beaa1ba7ed8c49fa2721cd088b33b561a0890533b9db367386a709512ecf211e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f8e8b7be5ebaa7ce8ca4c86e01a0bded
SHA1b72eeca5223db289b81377e88692fcf5f0c1a04f
SHA25692d00b7f45d7dc7a4e9b8a74a78f3c3734b191f6ce57a1923132a29550264f17
SHA5123ff92214fa9d5c3150aba42aa522dcfd017d33c37e8530e3e4ea016c56de734e90b69f67804ce457529a8e5ba0195f129d10f0305425e80932f4a35a4b19c013
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d6d19f2227901ee732984c1201f2b32
SHA130bdb42a49c45ce48e381ec91efc1875588620da
SHA2563f429134b08109b386999f79e0d93974973f4e5cbb7be7ac468f2e1d0cbc7187
SHA5125f2baf064080c780660819ca42a8813769304deb4202b6082fed04902951189388df51ee9090d9f70374119c9c2f9c715108e8edfcf2f83e23a63789a2adf00e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56ebda726f7d74866d25e9f6b2e96ef08
SHA19aed9652b0e7a5f8f0af3773140f1f633370fa82
SHA25648830a5aa932e701b0051e34a1be6b49873854b73ff3356035781201aab7e368
SHA5124e6bd25fc81b3e343779c04abfe86e0204c6b1886607108688e74a4b31e33a2b41ddacd857f6bd3f2f8a4d56150826aff650e7b6883f7869a01ce43c94faa099
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD572b4eb7d19299abb1ccf86af36f1b1a0
SHA12c829d5e5e6867a8ba9d0287f706ae1019766e7f
SHA25629eafa1e326fb3262932ffdc1900813c879968c5458e34952a942fb0fe816f86
SHA512a3498644fc2880a20afb9d4c9b8118d43f99615bd1620c751f3e2a51c74be81ad073915bae9cbd50ba718f52eb0651d6b19192f7313dc67fb735fb649ae048b4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c4d520f1967d5f8631e11d74b061dd30
SHA1b34d180aba5ea66a471b9af0f75c56b8a2fcb4b2
SHA25613132ce0b40f25411f3dc9f5cf59cc3ce00d97b9800357a80504881a1e0ef826
SHA5120bfcfaa64f4b302b231d0bbddaaa77614d948d99d86d15ebea75207b789a0a94ccfcd040537d3be9107585ade19e69b29b04cb964c87a06e81ca9e27a04120c5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50a0f1e1d9fa22434efe60fa857b93e08
SHA1b21fd6b6b22cdd31378fa9244ac2ef9028a280ce
SHA25649b324eec6aa457e5d2db3f742f3a3f3cc9ab681b3064552f0564e959635ad6b
SHA512c1067876f29d486d011904cc0e685ad96ccc945b9e8d6e64d9e2d3b15a559b1cde5cdbf85dd21348ea1aca09d305baaf05815757fea19e4b7fe456bf89bb53dd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD510e4d654d87d7c786e96cf4755f22700
SHA150d8110b58c5021f8d88ce68a8dc423ddcd206d8
SHA256e96ce0e459e8da9407c0f85b407481c7c5d258c760869b6aca3894f07e647b9d
SHA51299a83f18c026ecd424f33f05fb5e61fd2d7296f64d3a01f090685589eeb72dcaf7b35ed82eab6d2b440a98a21106422fa55c67620bf5b61b467533137863ca36
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
227B
MD508e88b4716a7dc0a6530d85491d19736
SHA1f56f189e549770ad693a26cac7e4dfa1e628adf9
SHA2569fa119137767b82d3f79ef819004b9a5288a9f244202cb43a07deb77a17fe260
SHA51222573165e1a7952bbccc4f3e3df11581bdec3da26f36a253aed3896a1127174b6bc7855086bae191ace660757f69a8ca79ddbbcaf6b242ae4b1fb0155fa8e2f1
-
Filesize
71KB
MD59c492d2dbc8f61f7bb6d8f49e2665222
SHA11d8dfd0f61bf4adb1e23760ab5ceabf4db584800
SHA2562f43535d9f670760fbf5e47aaa15e019ba72e2ffc8ecb79f4db89ab8ce867335
SHA512dd090d999e87cad30138f1febb7e8c1a2f061f67c4c320d254894fabedddbb40791312854f47ed52a95c62754939c2ee33b84939f5edf1b32a698af93655fb80
-
Filesize
32KB
MD583142eac84475f4ca889c73f10d9c179
SHA1dbe43c0de8ef881466bd74861b2e5b17598b5ce8
SHA256ae2f1658656e554f37e6eac896475a3862841a18ffc6fad2754e2d3525770729
SHA5121c66eab21f0c9e0b99ecc3844516a6978f52e0c7f489405a427532ecbe78947c37dac5b4c8b722cc8bc1edfb74ba4824519d56099e587e754e5c668701e83bd1
-
Filesize
4KB
MD5e3f3809f51c7982d96aaf9c090f7d176
SHA17494daa8000c0b31c58d94edc509232569a4606f
SHA256010f5e0c69b4a630b08b2551e03d8044a33350f151848dcf50953407012fab29
SHA5123fca284e384abc95201dc73f19bd9d75413e8890e819967070b9d9991115be2a8c17e07bd1aaaffcbc770b393bf9a2af253100ac4d9efba8d21110bac97737fc
-
Filesize
550KB
MD57103eddedf089adaff84539585df19af
SHA1a4cbef70b9233956bcfeccff176ae971fb16b73e
SHA25641e09d91850d85cf97ba5cef2936cf9bda879595694b1457e27c9aecad1ac349
SHA51238fd37ce6e3a72cd350dc6535222dffc011d0c66dfb09ce4adb3cb2ed1eb1834b7444172500e7e2062b8660b0c61925fbb2d249b5fced9166c7da7c49b93e191
-
Filesize
274KB
MD5986cc427326543cb6428895c9d18285f
SHA129f9700c639df045b7959aada45654f27a200e1c
SHA2569f4a160ad96e6b2ebc8312a9d7883493bbeb474432565dedc33541f8758812eb
SHA512272d40369d636bb8753afce3336691014f8648601b466a73768f1b66da89b2b0ca23c6bcadd1a4d5e6069432b0a333cbb1e2d37005a08310ede655fa57ec6e4d