Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 03:33
Static task
static1
Behavioral task
behavioral1
Sample
Detnox Free Registry Scanner Toolbar/detnoxfreescantoolbar.exe
Resource
win7-20240903-en
General
-
Target
Detnox Free Registry Scanner Toolbar/detnoxfreescantoolbar.exe
-
Size
1.3MB
-
MD5
8084e1a5e3afa48121e25eb46b36d8e2
-
SHA1
5afe3eeb7f0fd3b73347c185474a24d3ffb6add6
-
SHA256
2a7292ff80cee91d9d604159ac69045a9288c4f25a637458dcea11d3626b38b5
-
SHA512
39b72fc0f838bf8bdd13cc6b0dea23b9cdc3e75bdec28e380c069f6c55f42e63fdd706fa4ae44c2d58e5018be552c667b39481d53f657c8c25df68230dbad6f3
-
SSDEEP
24576:Ak5MoFN3mNbnI+SOe5n51viPklFHaYixqlOXtwXghDQ:AkdX4IB5n539ioewwh0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation GLB8666.tmp -
Executes dropped EXE 1 IoCs
pid Process 3772 GLB8666.tmp -
Loads dropped DLL 9 IoCs
pid Process 3772 GLB8666.tmp 3772 GLB8666.tmp 3772 GLB8666.tmp 3772 GLB8666.tmp 3772 GLB8666.tmp 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a875c103-9480-4618-85ff-29125a38c3ce} GLB8666.tmp Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a875c103-9480-4618-85ff-29125a38c3ce}\NoExplorer = "1" GLB8666.tmp Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\ GLB8666.tmp Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a875c103-9480-4618-85ff-29125a38c3ce} GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{a875c103-9480-4618-85ff-29125a38c3ce}\ GLB8666.tmp -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\GLBSINST.%$D GLB8666.tmp -
Drops file in Program Files directory 12 IoCs
description ioc Process File created C:\Program Files (x86)\Detnox_Free_Registry_Scanner\~GLH0001.TMP GLB8666.tmp File opened for modification C:\Program Files (x86)\Detnox_Free_Registry_Scanner\toolbar.cfg GLB8666.tmp File created C:\Program Files (x86)\Detnox_Free_Registry_Scanner\~GLH0002.TMP GLB8666.tmp File opened for modification C:\Program Files (x86)\Detnox_Free_Registry_Scanner\Detnox_Free_Registry_ScannerToolbarHelper.exe GLB8666.tmp File created C:\Program Files (x86)\Detnox_Free_Registry_Scanner\~GLH0003.TMP GLB8666.tmp File opened for modification C:\Program Files (x86)\Detnox_Free_Registry_Scanner\tbDetn.dll GLB8666.tmp File created C:\Program Files (x86)\Detnox_Free_Registry_Scanner\INSTALL.LOG GLB8666.tmp File created C:\Program Files (x86)\Detnox_Free_Registry_Scanner\~GLH0000.TMP GLB8666.tmp File opened for modification C:\Program Files (x86)\Detnox_Free_Registry_Scanner\UNWISE.EXE GLB8666.tmp File created C:\Program Files (x86)\Conduit\Community Alerts\~GLH0004.TMP GLB8666.tmp File opened for modification C:\Program Files (x86)\Conduit\Community Alerts\Alert.dll GLB8666.tmp File opened for modification C:\Program Files (x86)\Detnox_Free_Registry_Scanner\INSTALL.LOG GLB8666.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GLB8666.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language detnoxfreescantoolbar.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\URLSearchHooks\{a875c103-9480-4618-85ff-29125a38c3ce} GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{a875c103-9480-4618-85ff-29125a38c3ce} = "Detnox_Free_Registry_Scanner Toolbar" GLB8666.tmp Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 13000000000000000000000020000000100000000000000001000000000700005e010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTTopResultURL = "http://www.bing.com/search?q={searchTerms}&src=IE-SearchBox&FORM=IENTTR" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31136325" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2750816413" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}\URL = "http://search.conduit.com/ResultsExt.aspx?q={searchTerms}&SearchSource=4&ctid=CT1957583" GLB8666.tmp Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Toolbar GLB8666.tmp Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\User Preferences iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Use Search Asst = "no" GLB8666.tmp Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\DefaultScope = "{afdbddaa-5d3f-42ee-b79c-185a7020515b}" GLB8666.tmp Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b} GLB8666.tmp Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}\DisplayName = "Detnox_Free_Registry_Scanner Customized Web Search" GLB8666.tmp Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Height = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = e0a367a5451adb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "435241378" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\SearchScopes\{afdbddaa-5d3f-42ee-b79c-185a7020515b}\DisplayName = "Detnox_Free_Registry_Scanner Customized Web Search" GLB8666.tmp Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\SearchScopes GLB8666.tmp Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Toolbar\WebBrowser\ITBar7Layout = 13000000000000000000000020000000100001001600000001000000000700005e01000006000000010100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003c175a88094184685ff29125a38c3ce0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\URLSearchHooks GLB8666.tmp Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\DisplayName = "Bing" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURLFallback = "http://www.bing.com/favicon.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\SuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IESS02&market={language}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "2750660560" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a43d217a0cb97a4db769f976d8642e39000000000200000000001066000000010000200000006b8a342a5fe8dfaa612414b6dcd2320a2d015f93cb2ea4c4e3fdeae8faa2d8ba000000000e80000000020000200000004e1cedeb95af7886305dd191e71f7141d1e171499e6fcd6f7324b1b692fc6c0e20000000a25421671fa53d93962547c9a0fb5e8a961638d2420f7d6faca4380e6c7120bf40000000170cc6f61058a8869da69d538a7effc99e5edfc11110f8b36cd079d7429f7c922f0e02cda9d5d07099edf45fd68476f75abea97c90a38bf1605fd0d197fd3793 iexplore.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\URLSearchHooks GLB8666.tmp Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\SearchScopes GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Use Search Asst = "no" GLB8666.tmp Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\User Preferences\3DB9590C4C4C26C4CCBDD94ECAD790359708C3267B = 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 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconURL = "http://www.bing.com/favicon.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTSuggestionsURL = "http://api.bing.com/qsml.aspx?query={searchTerms}&market={language}&maxwidth={ie:maxWidth}&rowheight={ie:rowHeight}§ionHeight={ie:sectionHeight}&FORM=IENTSS" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000a43d217a0cb97a4db769f976d8642e3900000000020000000000106600000001000020000000923fb169a9d6601e4bbec2e36c69e798dd039656e8e95f600b43da8b6f7815a1000000000e80000000020000200000000328c0b81c672f7322984850fbd56e1e80fde93189c0d43ac2d6a71c0cedda0f20000000567f7f9668f9e42b1eb5f743373b202a40b7e779a38f7a619d082fc4096af20040000000acd8e100cd63b75bb780aef00f901a615aaa347f590ebb6ccb12d4873e5189a82ef28b38827d7f8462af7f476b998e6e207ab039f4b75333f242fa1ff48d1642 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main GLB8666.tmp Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main GLB8666.tmp Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{CF8303FD-8638-11EF-ADF2-FAA11E730504} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A}\NTLogoURL = "http://go.microsoft.com/fwlink/?LinkID=403856&language={language}&scale={scalelevel}&contrast={contrast}" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136325" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "2755191528" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\URLSearchHooks\{a875c103-9480-4618-85ff-29125a38c3ce} GLB8666.tmp Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\MAO Settings iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31136325" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE -
Modifies registry class 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\ = "Conduit Community Alerts" GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A875C103-9480-4618-85FF-29125A38C3CE}\ = "Detnox Free Registry Scanner Toolbar" GLB8666.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1} GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A875C103-9480-4618-85FF-29125A38C3CE}\InprocServer32\ = "C:\\Program Files (x86)\\Detnox_Free_Registry_Scanner\\tbDetn.dll" GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A875C103-9480-4618-85FF-29125A38C3CE}\InprocServer32\ThreadingModel = "Apartment" GLB8666.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32 GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32\ = "C:\\Program Files (x86)\\Conduit\\Community Alerts\\Alert.dll" GLB8666.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3c471948-f874-49f5-b338-4f214a2ee0b1}\InprocServer32\ThreadingModel = "Apartment" GLB8666.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A875C103-9480-4618-85FF-29125A38C3CE} GLB8666.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A875C103-9480-4618-85FF-29125A38C3CE}\InprocServer32 GLB8666.tmp -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2320 msedge.exe 2320 msedge.exe 464 msedge.exe 464 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1948 iexplore.exe 2056 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 1948 iexplore.exe 1948 iexplore.exe 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE 2056 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2796 wrote to memory of 3772 2796 detnoxfreescantoolbar.exe 84 PID 2796 wrote to memory of 3772 2796 detnoxfreescantoolbar.exe 84 PID 2796 wrote to memory of 3772 2796 detnoxfreescantoolbar.exe 84 PID 3772 wrote to memory of 1948 3772 GLB8666.tmp 87 PID 3772 wrote to memory of 1948 3772 GLB8666.tmp 87 PID 1948 wrote to memory of 2056 1948 iexplore.exe 89 PID 1948 wrote to memory of 2056 1948 iexplore.exe 89 PID 1948 wrote to memory of 2056 1948 iexplore.exe 89 PID 2056 wrote to memory of 3720 2056 IEXPLORE.EXE 90 PID 2056 wrote to memory of 3720 2056 IEXPLORE.EXE 90 PID 3720 wrote to memory of 2320 3720 ie_to_edge_stub.exe 91 PID 3720 wrote to memory of 2320 3720 ie_to_edge_stub.exe 91 PID 2320 wrote to memory of 2752 2320 msedge.exe 92 PID 2320 wrote to memory of 2752 2320 msedge.exe 92 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 1108 2320 msedge.exe 93 PID 2320 wrote to memory of 464 2320 msedge.exe 94 PID 2320 wrote to memory of 464 2320 msedge.exe 94 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95 PID 2320 wrote to memory of 3492 2320 msedge.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Detnox Free Registry Scanner Toolbar\detnoxfreescantoolbar.exe"C:\Users\Admin\AppData\Local\Temp\Detnox Free Registry Scanner Toolbar\detnoxfreescantoolbar.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\GLB8666.tmpC:\Users\Admin\AppData\Local\Temp\GLB8666.tmp 4736 C:\Users\Admin\AppData\Local\Temp\DETNOX~1\DETNOX~1.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\PROGRA~1\INTERN~1\iexplore.exe"C:\PROGRA~1\INTERN~1\iexplore.exe" http://DetnoxFreeRegistryScanner.OurToolbar.com/SetupFinish3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1948 CREDAT:17410 /prefetch:24⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe" --from-ie-to-edge=3 --ie-frame-hwnd=601de5⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --from-ie-to-edge=3 --ie-frame-hwnd=601de6⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffdcba46f8,0x7fffdcba4708,0x7fffdcba47187⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2064,10898349419094547409,8080989375356376039,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:27⤵PID:1108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2064,10898349419094547409,8080989375356376039,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2200 /prefetch:37⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2064,10898349419094547409,8080989375356376039,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:87⤵PID:3492
-
-
-
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3984
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4256
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD575568ac665c46fcbcb1516b0ee4c88f8
SHA1347174b695105f1d64321dafc3497bf1ad4cd4e6
SHA256693bd052006f539de10122c189642d9d2ee959d622f48c583852ce86b689f370
SHA512ca77f8eeebc1feed53c93ad6502dd8934d0b15b570baa6df9a2eb0d7797d7416f5a3666b2be8eddae4e8c0af210ce5f57701d22dd93085bcce998831160ad1b6
-
Filesize
149KB
MD5973567b98cdfc147df4e60471d9df072
SHA13c4735750c99c63e6861170a8c459a608594211e
SHA25669b9dd6160524e0eb44905224f5b1747dfce43243c00c11c87f5c2ec55102876
SHA512e891e3a413691eddd895a31293117aec8d151ecf18f84d3aa73bc1c4eb95582df1dfe04d51b7011eb55b5e754e2240de4c6269f9547f3cab3519985da1e07294
-
Filesize
1.7MB
MD5aac20ff867f631f4cc5b02cc62e0e15f
SHA17a1c98e96785784f336b9c3716086c26bbd6f461
SHA2565af0e776fb1f4e91a29f0b8eaffc7eca26c83e811e2e28a93e8526c8ee90d6df
SHA51249d5d97f46bc22be9298fe51c20a90f560ac804dc757e878f0c2e55ccf0c48e3587ab79cbc12c34cca65f5ec557eb2f7dbec4ea833bdb07cd0ecaf8eacabc0ca
-
Filesize
40B
MD5267ca74ec33b15579c2d80a6e1fd55ad
SHA14d5b4d5d5571de6410c13bbe2100c2ddfb0702aa
SHA2563dfe83491122dd5248e52b498c3395c5ae9f73e9db82222da220db1bb65ef3a4
SHA512e7e5b83d8edfa249f7fe6988e69ab423e031789eb516f556f511da69703e44a485105983ad3e70fe56be3dd022c28fda6d7de44b272027c284d1c593d0266fe5
-
Filesize
458KB
MD573f03e72aee5a85545befa0dc7a90f82
SHA160fac1a13b251193c01a1e17137d27edff6e7c15
SHA2563cfcdbf44c3332c3b47b48de28c721da09f910977c771f30216551ce5982d5fd
SHA512dd489d7b57fca25707b8577d86958414ad343e8937a92624c03c0f51a920d749fddae146274da5f698cd00ae74abe56b15f71be54d353dfbbb4151fd9130fc1f
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
5KB
MD54d2a108d9017e99c7573762076023eab
SHA12f669cd2902798a47277455266b8d92e6a6fe6a4
SHA25675710d0f4fd87e3af8aaecf26cd1d18e1cdcd45178befb34738c806a880e3a00
SHA512f603849dd0409c0865380f64a0e4457d2168f2b6f6c2caf354629daa1185a3b9817474b51e3c9d6c98883f01753651a098d7300d0e53a19d3e84d5e1919209be
-
Filesize
5KB
MD5acc6ababfe5423beaf2e5066bb6fa5b8
SHA18260626357618a16c481b0a651a4fcfd002319a5
SHA256c61f78af7b7048c88c6e21de339a7d111549fac8919271f6553bb1c30a3e93a5
SHA512ac4d0e4a0d2a20265a29a396b6a7a5e11df828132be96ff063da4839c4ee042ec28e0730f6986b911c800f9d76c5cea340cd8a4b09d666a2847d53f7d6303336
-
Filesize
5KB
MD5008d1901f3e46ac0afe8c2f53d28c58a
SHA12270ec14f39e2a91a16448fc56580adb2827204d
SHA2563b153965a2f66017ed2af33f50c7f5da537ce80a4480f8aa0b6daaf13f2afb53
SHA5128068b5681d4f511caead9a002c0193dae1b3cdae980e322442aaa3332d6d63fc52cf8ac0932cf4c64a68b68f6bd51a45935e910ee4f48f2e05dc7fe78582d748
-
Filesize
10KB
MD53c41a1f81621ab4e9ed123bd09232dc5
SHA1403cc52917522308f7800b8ed047dc8f796f7701
SHA256e4cb6b328bf17164ce72dd1a54acc2d2eaf11e8197711a76f2b8a77eb880ca17
SHA5123c508327cd644519b9a0dc5e5051302da223d477eb70e61a0f0255ad4f46ae6e908969ff45ebc63529ad44be4c179a95be691f0e920918594c9b255969bcd920
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
Filesize
742KB
MD525a40f949855471562a1a9e465cfed7c
SHA1c3a563c56fb8323e6c2ee7fa417c45d8384a4156
SHA256075f1f4ec57dcfdbb2f1b60ffbf9efe0286216c43d0a65f82eae86af66b36127
SHA512e5b4ed8df62488e7bb9ccb77f1daac251f65cd3251257ab94094df1316fa50a96901b32e7e76e47a4616d763ae54d7134f5d29f030ee7d2399bbe728498fedd4
-
Filesize
70KB
MD571c3ad7ce69587621a249f600b93a5d8
SHA1c5227be1d946a495d861cd9bbc3a73b2afc2bbe3
SHA256b8694842e966897bbe6bde4fcc1361d3df4d469b1f97ecbaf567efaf5173bda2
SHA51271f96fef4b3f04c65d0093dca779f6cb44fba8e14ad32465e4c80d3c87b50e2e29875f63c3d81dea7f05a84f9501bdd22a536191ec863299fbfcf4e3069a5b6a
-
Filesize
161KB
MD58c97d8bb1470c6498e47b12c5a03ce39
SHA115d233b22f1c3d756dca29bcc0021e6fb0b8cdf7
SHA256a87f19f9fee475d2b2e82acfb4589be6d816b613064cd06826e1d4c147beb50a
SHA5127ad0b2b0319da52152c2595ee45045d0c06b157cdaaa56ad57dde9736be3e45fd7357949126f80d3e72b21510f9bf69d010d51b3967a7644662808beed067c3f