Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
8Static
static
3dc543ffe00...18.exe
windows7-x64
7dc543ffe00...18.exe
windows10-2004-x64
7$PLUGINSDI...gy.exe
windows7-x64
7$PLUGINSDI...gy.exe
windows10-2004-x64
8$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...ro.exe
windows7-x64
7$PLUGINSDI...ro.exe
windows10-2004-x64
7$PLUGINSDI...FC.dll
windows7-x64
3$PLUGINSDI...FC.dll
windows10-2004-x64
3$PLUGINSDIR/inetc.dll
windows7-x64
3$PLUGINSDIR/inetc.dll
windows10-2004-x64
37ZipBuilder.dll
windows7-x64
37ZipBuilder.dll
windows10-2004-x64
37zxa.dll
windows7-x64
37zxa.dll
windows10-2004-x64
3BugTrap.dll
windows7-x64
3BugTrap.dll
windows10-2004-x64
3DocumentReader.dll
windows7-x64
3DocumentReader.dll
windows10-2004-x64
3GFLImageServices.dll
windows7-x64
3GFLImageServices.dll
windows10-2004-x64
3GFLLibraryBuilder.dll
windows7-x64
3GFLLibraryBuilder.dll
windows10-2004-x64
3GeoIP.dll
windows7-x64
3GeoIP.dll
windows10-2004-x64
3HashLib.dll
windows7-x64
3HashLib.dll
windows10-2004-x64
3ImageViewer.dll
windows7-x64
3ImageViewer.dll
windows10-2004-x64
3MediaImage...es.exe
windows7-x64
1MediaImage...es.exe
windows10-2004-x64
3Analysis
-
max time kernel
92s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 13:02
Static task
static1
Behavioral task
behavioral1
Sample
dc543ffe00d73f7bafc2e91116d75b6c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc543ffe00d73f7bafc2e91116d75b6c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/Download_Energy.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/Download_Energy.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/ProsperasoftwareAcPro.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/ProsperasoftwareAcPro.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SimpleFC.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SimpleFC.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/inetc.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/inetc.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
7ZipBuilder.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
7ZipBuilder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
7zxa.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
7zxa.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
BugTrap.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
BugTrap.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
DocumentReader.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
DocumentReader.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
GFLImageServices.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
GFLImageServices.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
GFLLibraryBuilder.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
GFLLibraryBuilder.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
GeoIP.dll
Resource
win7-20240729-en
Behavioral task
behavioral26
Sample
GeoIP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
HashLib.dll
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
HashLib.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
ImageViewer.dll
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
ImageViewer.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
MediaImageServices.exe
Resource
win7-20240704-en
Behavioral task
behavioral32
Sample
MediaImageServices.exe
Resource
win10v2004-20240802-en
General
-
Target
$PLUGINSDIR/Download_Energy.exe
-
Size
5.1MB
-
MD5
96a9c13cdb1c931c8d232dddf929a6ac
-
SHA1
7f29702918924cd1b9bd943fa0eaafecaeab4c75
-
SHA256
468eca855754732e658ac1d2ac677a9105f5c62580989f53295e6827232dfc68
-
SHA512
97dba7c1dd0f8a2bcd3afe92730f20d0171126e1ae0cd1f2218cbb91d0caae298b90bf7950733ff8c7a42daa8b5a747d7c9e00045a0ff73697b2a7bf66c11dd3
-
SSDEEP
98304:MHopKHIn2zDWnuL0uKVFWM1fYPSM03CNl4rDWd4u3czc1exjMtbQt:UCyDWuL0uKPWYfxn3CNk4eitG
Malware Config
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 7 4348 rundll32.exe 6 4348 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation GLB980A.tmp -
Executes dropped EXE 6 IoCs
pid Process 3972 GLB980A.tmp 4672 STUBWR~1.EXE 1852 conduitinstaller.exe 60 ct1269415_ie.exe 2904 ct1269415_ff.exe 736 ct1269415_ch.exe -
Loads dropped DLL 37 IoCs
pid Process 3972 GLB980A.tmp 3972 GLB980A.tmp 3972 GLB980A.tmp 4672 STUBWR~1.EXE 1852 conduitinstaller.exe 1852 conduitinstaller.exe 1852 conduitinstaller.exe 1852 conduitinstaller.exe 1852 conduitinstaller.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 60 ct1269415_ie.exe 4348 rundll32.exe 1068 rundll32.exe 1852 conduitinstaller.exe 1852 conduitinstaller.exe 2904 ct1269415_ff.exe 2904 ct1269415_ff.exe 1852 conduitinstaller.exe 1852 conduitinstaller.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 7 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ad708c09-d51b-45b3-9d28-4eba2681febf}\NoExplorer = "1" ct1269415_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ ct1269415_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ad708c09-d51b-45b3-9d28-4eba2681febf} ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ad708c09-d51b-45b3-9d28-4eba2681febf}\ ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ad708c09-d51b-45b3-9d28-4eba2681febf} ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{ad708c09-d51b-45b3-9d28-4eba2681febf}\ = "Download Energy" ct1269415_ie.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLB980A.tmp -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Download_Energy\ldrtbDown.dll ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\ToolbarContextMenu.xml ct1269415_ie.exe File opened for modification C:\Program Files (x86)\Download_Energy\ ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\uninstall.exe ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\toolbar.cfg ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\Download_EnergyToolbarHelper.exe ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\tbDown.dll ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\prxtbDown.dll ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\GottenAppsContextMenu.xml ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\OtherAppsContextMenu.xml ct1269415_ie.exe File created C:\Program Files (x86)\Download_Energy\SharedAppsContextMenu.xml ct1269415_ie.exe File created C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll ct1269415_ie.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conduitinstaller.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ct1269415_ie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ct1269415_ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Download_Energy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB980A.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ct1269415_ch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language STUBWR~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
NSIS installer 8 IoCs
resource yara_rule behavioral4/files/0x00080000000234af-150.dat nsis_installer_1 behavioral4/files/0x00080000000234af-150.dat nsis_installer_2 behavioral4/files/0x000d0000000235d1-166.dat nsis_installer_1 behavioral4/files/0x000d0000000235d1-166.dat nsis_installer_2 behavioral4/files/0x000d0000000233f0-309.dat nsis_installer_1 behavioral4/files/0x000d0000000233f0-309.dat nsis_installer_2 behavioral4/files/0x00090000000233f2-480.dat nsis_installer_1 behavioral4/files/0x00090000000233f2-480.dat nsis_installer_2 -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{60148F37-5C9D-4719-9755-A7ABFB09EE8E}\AppName = "Download_EnergyToolbarHelper.exe" ct1269415_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FC352791-4576-452F-AB1F-B0393CCA88C5} ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FC352791-4576-452F-AB1F-B0393CCA88C5}\AppName = "Download_EnergyAutoUpdateHelper.exe" ct1269415_ie.exe Set value (data) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\ApprovedExtensionsMigration\{ad708c09-d51b-45b3-9d28-4eba2681febf} ct1269415_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst = "no" ct1269415_ie.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\URLSearchHooks ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{60148F37-5C9D-4719-9755-A7ABFB09EE8E}\AppPath = "C:\\Program Files (x86)\\Download_Energy瘀" ct1269415_ie.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\ApprovedExtensionsMigration ct1269415_ie.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\Main ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{ad708c09-d51b-45b3-9d28-4eba2681febf} = "Download_Energy Toolbar" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{AD708C09-D51B-45B3-9D28-4EBA2681FEBF} = "Download Energy Toolbar" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FC352791-4576-452F-AB1F-B0393CCA88C5}\AppPath = "C:\\Users\\Admin\\AppData\\Local\\Conduit\\CT1269415" ct1269415_ie.exe Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing ct1269415_ie.exe Set value (int) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPageShow = "1" ct1269415_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar ct1269415_ie.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{60148F37-5C9D-4719-9755-A7ABFB09EE8E} ct1269415_ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{60148F37-5C9D-4719-9755-A7ABFB09EE8E}\Policy = "3" ct1269415_ie.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{FC352791-4576-452F-AB1F-B0393CCA88C5}\Policy = "3" ct1269415_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" ct1269415_ie.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{ad708c09-d51b-45b3-9d28-4eba2681febf} ct1269415_ie.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://search.conduit.com?SearchSource=10&ctid=CT1269415" ct1269415_ie.exe -
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32 ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD708C09-D51B-45B3-9D28-4EBA2681FEBF}\ = "Download Energy Toolbar" ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD708C09-D51B-45B3-9D28-4EBA2681FEBF}\InprocServer32 ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762}\InprocServer32 ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762}\InprocServer32\ = "C:\\Program Files (x86)\\Download_Energy\\prxtbDown.dll" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762}\ProgID\ = "Toolbar.CT1269415" ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar.CT1269415\CLSID ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\ = "Conduit Community Alerts" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762}\ = "Download Energy API Server" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762}\InprocServer32\ThreadingModel = "Apartment" ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929a8d4e-87ac-4604-b216-a5a2a2925762}\ProgID ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929a8d4e-87ac-4604-b216-a5a2a2925762}\VersionIndependentProgID ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD708C09-D51B-45B3-9D28-4EBA2681FEBF} ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD708C09-D51B-45B3-9D28-4EBA2681FEBF}\InprocServer32\ThreadingModel = "Apartment" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762}\VersionIndependentProgID\ = "Toolbar.CT1269415" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar.CT1269415\CLSID\ = "{929a8d4e-87ac-4604-b216-a5a2a2925762}" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AD708C09-D51B-45B3-9D28-4EBA2681FEBF}\InprocServer32\ = "C:\\Program Files (x86)\\Download_Energy\\prxtbDown.dll똀" ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{929A8D4E-87AC-4604-B216-A5A2A2925762} ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Toolbar.CT1269415 ct1269415_ie.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1} ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32\ = "C:\\Program Files (x86)\\Conduit\\Community Alerts\\Alert.dll" ct1269415_ie.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32\ThreadingModel = "Apartment" ct1269415_ie.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 60 ct1269415_ie.exe 60 ct1269415_ie.exe 736 ct1269415_ch.exe 736 ct1269415_ch.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 4672 STUBWR~1.EXE 1852 conduitinstaller.exe 60 ct1269415_ie.exe 2904 ct1269415_ff.exe 736 ct1269415_ch.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3440 wrote to memory of 3972 3440 Download_Energy.exe 85 PID 3440 wrote to memory of 3972 3440 Download_Energy.exe 85 PID 3440 wrote to memory of 3972 3440 Download_Energy.exe 85 PID 3972 wrote to memory of 4672 3972 GLB980A.tmp 86 PID 3972 wrote to memory of 4672 3972 GLB980A.tmp 86 PID 3972 wrote to memory of 4672 3972 GLB980A.tmp 86 PID 4672 wrote to memory of 1852 4672 STUBWR~1.EXE 88 PID 4672 wrote to memory of 1852 4672 STUBWR~1.EXE 88 PID 4672 wrote to memory of 1852 4672 STUBWR~1.EXE 88 PID 1852 wrote to memory of 60 1852 conduitinstaller.exe 89 PID 1852 wrote to memory of 60 1852 conduitinstaller.exe 89 PID 1852 wrote to memory of 60 1852 conduitinstaller.exe 89 PID 60 wrote to memory of 4348 60 ct1269415_ie.exe 90 PID 60 wrote to memory of 4348 60 ct1269415_ie.exe 90 PID 60 wrote to memory of 4348 60 ct1269415_ie.exe 90 PID 60 wrote to memory of 1068 60 ct1269415_ie.exe 91 PID 60 wrote to memory of 1068 60 ct1269415_ie.exe 91 PID 60 wrote to memory of 1068 60 ct1269415_ie.exe 91 PID 1852 wrote to memory of 2904 1852 conduitinstaller.exe 92 PID 1852 wrote to memory of 2904 1852 conduitinstaller.exe 92 PID 1852 wrote to memory of 2904 1852 conduitinstaller.exe 92 PID 1852 wrote to memory of 736 1852 conduitinstaller.exe 93 PID 1852 wrote to memory of 736 1852 conduitinstaller.exe 93 PID 1852 wrote to memory of 736 1852 conduitinstaller.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Download_Energy.exe"C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Download_Energy.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\GLB980A.tmpC:\Users\Admin\AppData\Local\Temp\GLB980A.tmp 4736 C:\Users\Admin\AppData\Local\Temp\$PLUGI~1\DOWNLO~1.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\CT1269~1\STUBWR~1.EXE"C:\Users\Admin\AppData\Local\Temp\CT1269~1\STUBWR~1.EXE" -parameters=C:\Users\Admin\AppData\Local\Temp\CT1269415\parameters.csf3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\conduitinstaller.exeC:\Users\Admin\AppData\Local\Temp\conduitinstaller.exe -StartPage=TRUE -DefaultSearch=TRUE -SearchFromAddress=TRUE -InstallId=CT1269415_download_energy.exe -OpenUninstallPage=TRUE -Fix404=TRUE -EnableAlerts=TRUE -openwelcomedialog=FALSE -ctid=CT1269415 -ie=C:\Users\Admin\AppData\Local\Temp\CT1269415\CT1269415_ie.exe -ff=C:\Users\Admin\AppData\Local\Temp\CT1269415\CT1269415_ff.exe -ch=C:\Users\Admin\AppData\Local\Temp\CT1269415\CT1269415_ch.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
\??\c:\users\admin\appdata\local\temp\ct1269415\ct1269415_ie.exe"c:\users\admin\appdata\local\temp\ct1269415\ct1269415_ie.exe" /s -silent -startpage=true -defaultsearch=true -showwelcomepage=false -openwelcomedialog=false -showpersonalcompdialog=false -fix404=true -searchfromaddress=true -searchfromadress=true -openuninstallpage=true -defaultsearchdisplayname= -defaultsearchurl= -enablealerts=true -installtype=ConduitNSISIntegration -installid=ct1269415_download_energy.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files (x86)\Download_Energy\tbDown.dll" DllSendInstallationUsage New Installation6⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4348
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 "C:\Program Files (x86)\Download_Energy\tbDown.dll" DllVerifyEnableExtension6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1068
-
-
-
\??\c:\users\admin\appdata\local\temp\ct1269415\ct1269415_ff.exe"c:\users\admin\appdata\local\temp\ct1269415\ct1269415_ff.exe" /s -silent -startpage=true -defaultsearch=true -showwelcomepage=false -openwelcomedialog=false -showpersonalcompdialog=false -fix404=true -searchfromaddress=true -searchfromadress=true -openuninstallpage=true -defaultsearchdisplayname= -defaultsearchurl= -enablealerts=true -installtype=ConduitNSISIntegration -installid=ct1269415_download_energy.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2904
-
-
\??\c:\users\admin\appdata\local\temp\ct1269415\ct1269415_ch.exe"c:\users\admin\appdata\local\temp\ct1269415\ct1269415_ch.exe" /s -silent -startpage=true -defaultsearch=true -showwelcomepage=false -openwelcomedialog=false -showpersonalcompdialog=false -fix404=true -searchfromaddress=true -searchfromadress=true -openuninstallpage=true -defaultsearchdisplayname= -defaultsearchurl= -enablealerts=true -installtype=ConduitNSISIntegration -installid=ct1269415_download_energy.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:736
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
623KB
MD56796f6e449f90a543dc3345538acc46f
SHA197bccd25561f44e9b13f05f6eef083c9ce9ba529
SHA256f22e58cdfe94d4a5fbbf2795a743b167ed9923e289e14654631e0077dd306c1d
SHA512f4402027bf1d40f550aab809b17f3bb8543ae76694d1a0ca429c6e1a0e2eacd835b81c4d8f13debed5c80e51c4214991ec8dba8f3a5731b8e5c8ff88e047685a
-
Filesize
172KB
MD54c163bd2a5905d18893ee311608e8c54
SHA1a2d929a9864513c0e8ed84aad622ef6adcc9b950
SHA2564553d99f1f146e2359ceb60987d904bafd24843b71d3e95c358776f3a1d5c6f1
SHA512e1c7b44dc683f58c7c7b66b2448ed19c4e846b35f4018592c2d87191f3d8a2e4649ec3c92aa2f444b249f8ac27e5f2e7fe1cefbedd5d12721d21335a1c55afb1
-
Filesize
27B
MD5e9554810d9fb5a0452acc4b13f4f3048
SHA18b71243ecae23e3884cd0265982e5cfe5464c48a
SHA25692dcbbc5d0ac2f28103c8f33be2d9e898686e417666ae142518fd52c8b5c1442
SHA5126cd5142906f5f98e261d7b49799e20b80b9a5503458a78d234d38c25bd977a6e7c53ee114b898f71a99efd49e4fe5d03871a11077060ca7cddeffe7a1c810cb7
-
Filesize
257KB
MD576b3946090c94bb38dbbca54ac8ff9f7
SHA11e00782fec3ca539ae30f866502633ff550356c6
SHA256d3f942951b10476d7f16124295bbacd6da61f63edee8d136260715cc4d929e99
SHA5127c5e1231e6a0174f6c0c88c12bccdef673fd81001f746b7b4e543e73b078312b2fa808bda1616e93f98d44df99ee0d31a9bef2a7adcda783d6b21db7c897e793
-
Filesize
1.5MB
MD5233c83de3843c900e8f356e2e362ec3c
SHA1cd5b9450f792eaf2422bc79061959f8546051761
SHA25689167ecf8ba5dbdea7c3acc0c4c8267cfc3bd761eeb86e2073660d99b9480759
SHA51292ac03f9df96ae1ed97f4e890b7c75cbe3d4b031f72f27b9ccf1b27e06aacf5fe805dcc208a2650ade29200f244167b4889fd2f4eca7c7956701f22502c29c09
-
Filesize
1.3MB
MD5c508904e6d99b7a322a9d7c7435dc5f3
SHA12fc113e92804e4d27475e23e74f54d8c1994fd3b
SHA256e5c1eab74fa5425abb72c52aa41f7572d4d161edb79504a8779758f61ffca3b4
SHA512cd73ebaf24c982ed423454e509b58205207f48da76d5a6e7cff3b22e648f72a04495a1f84dc0bd9852b3db8652ce57d2043460b3cec051f86d2cfa77e564afeb
-
Filesize
237KB
MD56c729a49e8776ba7b52503bb736de1b5
SHA13a26fbd2fbe2564e2a69f3a64c39940c3ea69920
SHA256b4a1c56c5936f81ceecd8ea31cd3aa56c9c8de954a8601d970ff8be2ef736fdb
SHA512cd9370b88f710fe552d640bb9330f3401864b293a57cb309bdde3afa8c1244858c86267c9d2a23da7f8b9f5a00adc5dbffa15f63cc79ace84d35e267a6c15d31
-
Filesize
70KB
MD512457304fe66ac4b06e940451a476d0f
SHA15d2b4dead64e175c7f8a66d9a3e0f4f1c0796e9c
SHA2566fd48e58a9904869fc4edc94817ce771d3aee46f5e4558bab99c432afd1dc8ce
SHA512cb947b259d42704252c61658d75998c651272855878552831a20d79e6f4838b2f0d78af14b03e7f575638fa7e38259d87fb01d23856d020b5fbdb134e7a54be1
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f
-
Filesize
33KB
MD5517419cae37f6c78c80f9b7d0fbb8661
SHA1a9e419f3d9ef589522556e0920c84fe37a548873
SHA256bfe7e013cfb85e78b994d3ad34eca08286494a835cb85f1d7bced3df6fe93a11
SHA5125046565443cf463b6fa4d2d5868879efc6a9db969bf05e3c80725b99bd091ce062cfe66c5551eb1cc5f00a38f2cfcda1f36fb4d60d9ff816c4ec3107b5a0df40
-
Filesize
199KB
MD577b50711b04aa0bf26f9977434db315d
SHA15110b3a2ade2494e1e2f58785c78ba3c6a7ee6b1
SHA256b268697abaa33a5e61532a99ee208861900d40b0ade549e45de228a5bb637d64
SHA512a276ac5e4c7f360ca1d0e56e56a95e3a06c6c423436e98ba1c2d40e7d11230c8ebb32744f5620df7f85d73780c342aeedcd91540381faaa16eeb31c48caa5f76
-
Filesize
163KB
MD52dc35ddcabcb2b24919b9afae4ec3091
SHA19eeed33c3abc656353a7ebd1c66af38cccadd939
SHA2566bbeb39747f1526752980d4dbec2fe2c7347f3cc983a79c92561b92fe472e7a1
SHA5120ccac336924f684da1f73db2dd230a0c932c5b4115ae1fa0e708b9db5e39d2a07dc54dac8d95881a42069cbb2c2886e880cdad715deda83c0de38757a0f6a901
-
Filesize
348B
MD56e7b34e4caf29351bec697bb88cd8250
SHA1d8c440bba344da13b944b7e896cafc9879d33c8c
SHA25692310f7d8da063154260648db3997488f250583ff45856302cb717e1c63cfb92
SHA512b28d65b149d8f284a8a772d1e4b8c4a75bdc123f587675600ec5fd6872c2323839fee37643a8b5528f17490ed8bb87e9af60a1ac6731bdadd10a05ba482ad781
-
Filesize
11KB
MD5a82b0479708b96c7bf4dd6b798aedee0
SHA17e47b402848a86bdddd5f0de8bb4620471caaab0
SHA25672410442a894b8316da6ad469f03997ec17c0b0d117745bb6ac5cac3232c7d20
SHA51202e07def3897d87d546c0cf1492191591be587f64ae5c165b9a91fb977585c65a860135eb8c102b67dede913ea935459ce70c4ca973b292122c8d097ab130d58
-
Filesize
4.2MB
MD52d2894581d355d5f44eae38898a66846
SHA13e30150d840ac9a0c0a7969d2ffd45118be827d6
SHA2564d96ac3f164e9262eb622d442778fe1d8c2d3719478f8e299e49cad1f8705262
SHA5126cb7754548e93a51897fa5af5ed6364f61aac535b0ff394e90942d50e522d5b4b6c8c88e7a07f89311e53e227fe4d909952da76221f1d00449d83521dc659356
-
Filesize
471KB
MD570e3b20d184751b642b06c5a7855c455
SHA189b00dc942e9c4965765acdb08b3e4a392f2af66
SHA25692e693d3d8be731a66a314e5f15cfad1f4e656f3fee3d32e9e9a736b80be46c1
SHA51248318557e3eb67379b8a8732457ef07864d4dd7a711f22834f883aaa66dbdab01b490a8928c831690e9aadc1514dfb559731142d7c10afd3e75550ab303a0dd3
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
58KB
MD57a69b2f909c684b261c5e295e95351c6
SHA105df8e4e072bd877e5a641608ee35f2cdcf544fb
SHA25659a81b8119a2e2bc2dcc22d8dbf87b20d6fe8c734930bf86d326cd2708f99358
SHA512aaccf1bd2254a65c7f8f300fe60b028b95f921d03e6507154d56ad2161dfdda8cd7716d00cff7c4512040bca8610ab7a0684cefec4eb729b98874aa35b5c5a97
-
Filesize
6KB
MD5acc2b699edfea5bf5aae45aba3a41e96
SHA1d2accf4d494e43ceb2cff69abe4dd17147d29cc2
SHA256168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e
SHA512e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v6rlcu3a.Admin\extensions\{ad708c09-d51b-45b3-9d28-4eba2681febf}\install.rdf
Filesize1KB
MD531d95789cce0b8b5dd72ac3bfd6de723
SHA18ba85068dfdc0b009ae55d48f447d9db1c00321b
SHA256d26573e75f1366ba9a3e1f0fb035c365515e8224330276b534ebcbef10e93cda
SHA51229e7bed2f95ebc73d5d7804e117eaf951a820acb7521d5257b07f49f3c97c57b8f4f1614d2578ddb2cad37bf13e3f7794b800fb8b37df982bc33645339e74278
-
Filesize
2.0MB
MD5a87c9807ff5c490a21beeb3e44391c99
SHA1eb5fd8587716b0b20e72217bbdbc3920a278451b
SHA256102c0721d2f518abb62c671504a8a163034060a8217c70a4025afece7116e46f
SHA512692656f37f7e1fc919d7847b6bbd11fb36d6a3b37c77f552afa838ac643a27f7063a57d14c4f5a7682b0c8e8f9f0c4b5ef62a6a2c871a77be1e52ce4369f2802
-
Filesize
417B
MD5099b0d94cd16eff2e794767096dfb000
SHA1e4d2f84884f17b2d3a57016343f6d82ac8643e77
SHA256ad8d3bab709ea2d8166ebfb0b67b53370d21f8d5414ac5b33c607dbdfab46149
SHA512ed0443d2118c3b62a3218946506a04e1cc3663a0aab60afb5ff0bc5cf88452fb0387f4253bc26811a5e715841d4686899fee42d5cab250b20950efa0257198b3