Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 19:25
Static task
static1
Behavioral task
behavioral1
Sample
0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe
Resource
win10v2004-20241007-en
General
-
Target
0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe
-
Size
2.7MB
-
MD5
2352db00f57ee7af115a65cdb7474d50
-
SHA1
50927c37c1d7f19f60cc48e9d9980df57d537bf1
-
SHA256
0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90
-
SHA512
6a99aaa9503a8b4cc2864fee662253441c113bb397cfb6827906e3dd7a6f5818ca7bf9cf385bf63acb9292bfc98509bda7b8015d645636b70521a2fa67b3ccad
-
SSDEEP
49152:bom/bxGVbH+EapAfEUKLTpSZY1UDqnd60unoCg8O/+d8ZcLgEOIPTebA5rOYiZnO:rzSWpoEDLT/1Dd61o9VzZcLFebSivZnO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Inbox.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 19 IoCs
pid Process 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 3664 Inbox.exe 4544 Inbox.exe 4348 Inbox.exe 1980 Inbox.exe 3828 AGupdate.exe 4076 AGupdate.exe 1948 AGupdate.exe 3256 AGupdate.exe 3148 AGupdate.exe 2036 AGupdate.exe 3012 AGupdate.exe 4088 AGupdate.exe 2588 AGupdate.exe 3204 AGupdate.exe 3928 AGupdate.exe 2128 AGupdate.exe 4752 AGupdate.exe 3164 AGupdate.exe -
Loads dropped DLL 9 IoCs
pid Process 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 4544 Inbox.exe 4544 Inbox.exe 616 regsvr32.exe 3760 regsvr32.exe 3760 regsvr32.exe 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\InboxToolbar = "\"C:\\Program Files (x86)\\Inbox Toolbar\\Inbox.exe\" /STARTUP" Inbox.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Installs/modifies Browser Helper Object 2 TTPs 6 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\NoExplorer = "1" regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{D3D233D5-9F6D-436C-B6C7-E63F77503B30} regsvr32.exe -
Drops file in Program Files directory 31 IoCs
description ioc Process File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-MMP6R.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\general_facebook2.xml Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\Plugins\ssleay32.dll Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\is-SF5QQ.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-458QK.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-NSTSQ.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Inbox.ini Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-SE6OO.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\unins000.msg 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\setupcfg.ini 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\general_youtube2.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\notifier_hotmail.xml Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\is-NRVA1.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\is-UBTMP.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\notifier_gmail.xml Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\is-JGCP1.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-QMF94.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\is-9RB4A.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-4N81E.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\unins000.dat 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\setupcfg.ini 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\mail_plugin.xml Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-KUO9Q.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\BTN_1803.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Plugins\plugins.ini Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\Plugins\libeay32.dll Inbox.exe File created C:\Program Files (x86)\Inbox Toolbar\unins000.dat 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\Plugins\is-GMNR8.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File created C:\Program Files (x86)\Inbox Toolbar\Buttons\is-7CIGU.tmp 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\blue_orange.xml Inbox.exe File opened for modification C:\Program Files (x86)\Inbox Toolbar\Buttons\notifier_yahoo.xml Inbox.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inbox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AGupdate.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppName = "Inbox.dll" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Policy = "3" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\DisplayName = "Inbox Search" Inbox.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\ShowSearchSuggestions = "1" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" Inbox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\Policy = "3" Inbox.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} = 00 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppName = "Inbox64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppName = "Inbox.dll" regsvr32.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Toolbar\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} = 00 regsvr32.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\Main regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Policy = "3" regsvr32.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6} Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB} Inbox.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\IEWatsonEnabled = "0" regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\FaviconURLFallback = "http://www2.inbox.com/favicon.ico" Inbox.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\FaviconPath = "C:\\Users\\Admin\\AppData\\LocalLow\\Microsoft\\Internet Explorer\\Services\\search_{C04B7D22-5AEC-4561-8F49-27F6269208F6}.ico" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Policy = "3" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Main\IEWatsonEnabled = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppName = "Inbox64.dll" regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Policy = "3" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB} Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\AppName = "Inbox.exe" Inbox.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\SuggestionsURL_JSON = "http://www.inbox.com/s.aspx?q={searchTerms}" Inbox.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\AppName = "Inbox.exe" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\AppPath = "C:\\Program Files (x86)\\Inbox Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar regsvr32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{612AD33D-9824-4E87-8396-92374E91C4BB}\Policy = "3" Inbox.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main regsvr32.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{C04B7D22-5AEC-4561-8F49-27F6269208F6}\URL = "http://www2.inbox.com/search/dispatcher.aspx?tp=bs&qkw={searchTerms}&tbid=80219&iwk=&lng=en" Inbox.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://www.inbox.com/homepage.aspx?tbid=80219&iwk=&lng=en" Inbox.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\0\win64\ = "C:\\Program Files (x86)\\Inbox Toolbar\\Inbox.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\Implemented Categories regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}\TypeLib\Version = "1.0" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\TypeLib\ = "{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.Toolbar\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}\1.0\0\win32\ = "C:\\Program Files (x86)\\Inbox Toolbar\\Inbox.exe" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\ = "IAppServer2" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.AppServer\Clsid\ = "{612AD33D-9824-4E87-8396-92374E91C4BB}" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}\TypeLib\ = "{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612AD33D-9824-4E87-8396-92374E91C4BB}\ProgID\ = "Inbox.AppServer" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\inbox\CLSID = "{37540F19-DD4C-478B-B2DF-C19281BCAF27}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\0 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InProcServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\TypeLib\ = "{CBEF8724-D080-4737-88DA-111EEC6651AA}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ = "Inbox Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\0\win64\ = "C:\\Program Files (x86)\\Inbox Toolbar\\Inbox64.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}\1.0 Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}\1.0\HELPDIR Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{7DD95802-9882-11CF-9FA9-00AA006C42C4}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox64.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\HELPDIR\ = "C:\\Program Files (x86)\\Inbox Toolbar\\" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\ = "IJSServer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}\TypeLib Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612AD33D-9824-4E87-8396-92374E91C4BB}\TypeLib\ = "{615E8AA1-6BB8-4A3D-A1CC-373194DB612C}" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.Toolbar\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\InprocServer32\ = "C:\\PROGRA~2\\INBOXT~1\\Inbox.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\ regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\ = "&Inbox Toolbar" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CBEF8724-D080-4737-88DA-111EEC6651AA}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{CE057E0D-2D7E-4DFF-A890-07BA69B8C762}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{042DA63B-0933-403D-9395-B49307691690}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}\TypeLib Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\ = "IAppServer2" Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{59FB2056-D625-48D0-A944-1A85B5AB2640}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PROTOCOLS\Handler\inbox\CLSID = "{37540F19-DD4C-478B-B2DF-C19281BCAF27}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8FAE973C-3FE3-44BF-81F0-ADB0D42CE851}\ProxyStubClsid32 Inbox.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D7E97865-918F-41E4-9CD0-25AB1C574CE8}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{D3D233D5-9F6D-436C-B6C7-E63F77503B30}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{28C3737A-32D1-492D-B76B-8D75EBBFB887}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" Inbox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\Implemented Categories\{7DD95801-9882-11CF-9FA9-00AA006C42C4}\ regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{042DA63B-0933-403D-9395-B49307691690}\ = "Inbox Toolbar" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{37540F19-DD4C-478B-B2DF-C19281BCAF27}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Inbox.JSServer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{612AD33D-9824-4E87-8396-92374E91C4BB}\ProgID Inbox.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 1980 Inbox.exe 1980 Inbox.exe 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1980 Inbox.exe 1980 Inbox.exe -
Suspicious use of WriteProcessMemory 62 IoCs
description pid Process procid_target PID 5100 wrote to memory of 1552 5100 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe 85 PID 5100 wrote to memory of 1552 5100 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe 85 PID 5100 wrote to memory of 1552 5100 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe 85 PID 1552 wrote to memory of 3664 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 87 PID 1552 wrote to memory of 3664 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 87 PID 1552 wrote to memory of 3664 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 87 PID 1552 wrote to memory of 4544 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 88 PID 1552 wrote to memory of 4544 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 88 PID 1552 wrote to memory of 4544 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 88 PID 1552 wrote to memory of 616 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 89 PID 1552 wrote to memory of 616 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 89 PID 1552 wrote to memory of 616 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 89 PID 1552 wrote to memory of 3760 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 90 PID 1552 wrote to memory of 3760 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 90 PID 1552 wrote to memory of 4348 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 91 PID 1552 wrote to memory of 4348 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 91 PID 1552 wrote to memory of 4348 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 91 PID 4348 wrote to memory of 1980 4348 Inbox.exe 92 PID 4348 wrote to memory of 1980 4348 Inbox.exe 92 PID 4348 wrote to memory of 1980 4348 Inbox.exe 92 PID 1552 wrote to memory of 3828 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 97 PID 1552 wrote to memory of 3828 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 97 PID 1552 wrote to memory of 3828 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 97 PID 1552 wrote to memory of 4076 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 98 PID 1552 wrote to memory of 4076 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 98 PID 1552 wrote to memory of 4076 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 98 PID 1552 wrote to memory of 1948 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 99 PID 1552 wrote to memory of 1948 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 99 PID 1552 wrote to memory of 1948 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 99 PID 1552 wrote to memory of 3256 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 100 PID 1552 wrote to memory of 3256 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 100 PID 1552 wrote to memory of 3256 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 100 PID 1552 wrote to memory of 3148 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 101 PID 1552 wrote to memory of 3148 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 101 PID 1552 wrote to memory of 3148 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 101 PID 1552 wrote to memory of 2036 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 102 PID 1552 wrote to memory of 2036 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 102 PID 1552 wrote to memory of 2036 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 102 PID 1552 wrote to memory of 3012 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 103 PID 1552 wrote to memory of 3012 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 103 PID 1552 wrote to memory of 3012 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 103 PID 1552 wrote to memory of 4088 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 104 PID 1552 wrote to memory of 4088 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 104 PID 1552 wrote to memory of 4088 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 104 PID 1552 wrote to memory of 2588 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 105 PID 1552 wrote to memory of 2588 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 105 PID 1552 wrote to memory of 2588 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 105 PID 1552 wrote to memory of 3204 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 106 PID 1552 wrote to memory of 3204 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 106 PID 1552 wrote to memory of 3204 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 106 PID 1552 wrote to memory of 3928 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 107 PID 1552 wrote to memory of 3928 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 107 PID 1552 wrote to memory of 3928 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 107 PID 1552 wrote to memory of 2128 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 108 PID 1552 wrote to memory of 2128 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 108 PID 1552 wrote to memory of 2128 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 108 PID 1552 wrote to memory of 4752 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 109 PID 1552 wrote to memory of 4752 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 109 PID 1552 wrote to memory of 4752 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 109 PID 1552 wrote to memory of 3164 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 110 PID 1552 wrote to memory of 3164 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 110 PID 1552 wrote to memory of 3164 1552 0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe"C:\Users\Admin\AppData\Local\Temp\0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\is-GVDGR.tmp\0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp"C:\Users\Admin\AppData\Local\Temp\is-GVDGR.tmp\0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp" /SL5="$D006A,2117984,70144,C:\Users\Admin\AppData\Local\Temp\0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /regserver3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:3664
-
-
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /install3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies registry class
PID:616
-
-
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Inbox Toolbar\Inbox64.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- Modifies Internet Explorer settings
- Modifies registry class
PID:3760
-
-
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /afterinstall3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files (x86)\Inbox Toolbar\Inbox.exe"C:\Program Files (x86)\Inbox Toolbar\Inbox.exe" /TRAY 04⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4076
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3256
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3148
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3204
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"C:\Users\Admin\AppData\Local\Temp\is-RS61S.tmp\AGupdate.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3164
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54f58bd77d5215c8ea9fca92348b1fae0
SHA154f8ccf9ef3e50f84e90ef44409c451e58078a5b
SHA2566aa1e3b989152e4ff96f2aebfbbb08fe3a4b39836ccbcbebecd3027747f64456
SHA51265db2355c3805ccf432f86b5b2a1c8fcfea3ffcc7e2efca8c986f778b4efb3b73248a7095d4068003289b829dc9efa8e09e095af4cfdc8ed65a0b5683beca243
-
Filesize
52KB
MD5edebae5f86c6077993d53c70c5b0dbcf
SHA140beac8dccaeffc8765f0f4aaa88afd0696b5ec4
SHA2566048d5628580f2ac1c4008b5538f22eca6941a2d5217204ba2912553273c0d02
SHA512af9a9c7bed762b35b24a2ce3b13d1c88b971eedc8090e32ce8e278b8a5f1c983c57abc152f598cc418f20b2ad4b8fb90535371ddac2102a325b777e20d8eaa16
-
Filesize
3KB
MD5ca8c448f8b4b20cb8777cec582e6b239
SHA1abac8657677420c41c676614a4e04503f615cd49
SHA2569168c4770940b6db7729de3e743a7ca40227b6991af974f3fce182af98880f7c
SHA5128d93f1931452af85b012c7789ecc14e345cd26ed58f29af886ca203894e7e43d72e993f20949c60f1f89a750643331f67593bb88727e15cd82f3fd48c0804950
-
Filesize
5KB
MD576f61b750c1147dcfa85477fe93f684e
SHA11d3d3e3657a54d58afcb02add4b612287945a68c
SHA25652dbd28ecd8381fc51d2599fc3d1b753718fc71ec7f4623adc40681f003088f2
SHA5125e2414a8bb773342df1a29fade679d02b26237e1cc54bcb09b311824a7d460534de5721470df76f203b64e84c4ec1a82bfe3b0be2881a7370ea76d4a6524ca93
-
Filesize
6KB
MD50babf04812619e388c94ea8e1846b1c0
SHA10d5a23149ef477c0fc442cc39812391dc6a801bb
SHA256284e810053cb7e851a02fd9433293ac4646bce0059724e270dc9256f327759e8
SHA5129a53093815cbacb53e87009b812fa405528ea73052ccf0d937c08ac0d2063ca793e361f7de5aeb6ddd243150137840db5c095e5a7b0fbfa1f63a062486337539
-
Filesize
4KB
MD56f85e9f946d670418c0eef66db41e95c
SHA13f6645f148b43de1fe842b460aa39b5888aca108
SHA256183d202e8cd65a360ce819f2fb611402294609a7d8715bed29a7723d17e3a73a
SHA512f5d557f9edd12b64fa5f55ad62c30372330b8d334591d83e583ddffd1478f76c9650129de587e4cda74ff04a5c541ed2071b6e87968460e265b835c7092b9c9e
-
Filesize
7KB
MD5ab3e969b6135e60af144d432cf065b8e
SHA143cfc22fef8be995cd8fcb76ecd9f3f681c7e6aa
SHA256f23eb38bf6ce6b869c1e9ae0618ea73bd754383ffe7117733dbb17bd09cfd836
SHA5124c2feced26275db6d415eedf496225b2eea3e1dc170826b6df41eb178e19e5ed1f2fcd08587353bbe41edf2bbfa90a607edcedc523734e058893a7ac19f194eb
-
Filesize
4KB
MD589155e60254e1b8916e18a8856ddef74
SHA1aa29e0ed8e61c0045da8351575777b47985ce150
SHA256603f1c31f8583f34b372d6382ddbf535117f154bed71813e4cddf01be86e36e6
SHA51222b59b0559829f719725272ceb854b109ced7b5a75a4d4b0b06f3bba6a98aa52051f7e9197d839bce203f46bbc2af4be85172f1a3466e9b308d4d5b15dc9bb10
-
Filesize
1.0MB
MD5c414a08abf408565145f54f626fe2950
SHA1c57479b1858817337c8d2705e8ec6a5d0af855ff
SHA2564de7c3192fceb8c6c583cdd3882752289d8a942cb088930ccedbec20f2449562
SHA5120ef7261860651d1ec3ecbb24f3f9a8ec676e4b4e556c68c3948de4bfa134ffbae35a92b807aab25b188788bb6f23784d43aac888ab1c255e119400be755ca604
-
Filesize
1.3MB
MD5f91e30bcebc1c328d6768d2a879bfb6c
SHA1641c19d93d1bc2a5a99d7d164372c6e38971ade3
SHA2562f51d5641832b44ba873fe7bef29bb14aab2d3c1396c02e5b41c7f91d5742a3c
SHA51256856ee6f483cfafc025df01fe8a1b6dc5bccee5d4ebb506826e40cb7c67ed52e52e11b5ab163e16303af5d5e16614885bbed403eff55ec3081d89e6f4129f6b
-
Filesize
1KB
MD5213d3d4b5ff1f54493079f538daaae65
SHA1192148e6d5cf44b717e587a19bcea20db0109452
SHA256888875bdd31664dc6215fa0295db7bcf9182534a318bcbb4a35b218064b047bc
SHA512e45f58368bbb497ed9b269a208237ecd956bf9bfe78e6daba123e97e0f377d199646a7b436255fa4e8a50f8a71d74f11428df9608a41eafdc4dfbb8b6bda0b84
-
Filesize
2KB
MD561c775b1c7d8b31c388011ee16a152aa
SHA1cc0e121e95d3f4171dd90ba013d1e795db2868f6
SHA2565dc242a929dd7a5331f58e62615862669e54fb7775726b2e2877c0b305a487d3
SHA5122f8706f88ddcc1be7f4985740a7e9e5e18e802bf5bb1558b6145cfc49517f03310e817af200ff48502f8fcb5b49f2ea113c7a3a119579d60b57387acbc82be21
-
Filesize
1.5MB
MD5d9dd50203a63c9a3a2b702faca1b17b5
SHA1204ae49aca0a02d9c174d56252a4b3e963b4762b
SHA25620eddf3f911015a142b2482d25be305ee5918ab305345d47a5e4c437bc8c2b4d
SHA512266516cc1b024f27c67f3622931f2bea56e6a8f9f4e72cc9318617c7acd44b098588cfbc7848ede3dfa23b331f12efb0a978c97e111ad5f85f1a7c71478afbff
-
Filesize
1.2MB
MD51748f047e1f9d62d382c0b58f44eb41a
SHA196ac03402952404fef751d4da04da7d46e6dd155
SHA2560bdd9b11ff413c51257ad1428cff4347909924d343641bc1144d9d4e0742eb3c
SHA512dfb8cbe9130aa73e67f215158e45a0f66546d59bca97cd7d072341d3986f01d3d31d8564fa08d356f74b424bccb70a396b50e137a777bc6e72e105f0dfc01e85
-
Filesize
80B
MD5e0cc599ccc766828d1faabbe0bf332bc
SHA1c8e4c6e6adc848f19bf3d7d192074db4fcc48319
SHA25615c1c617c744cf37861d8b6c4e33709df25a43dd4e2939ec1287b40173794b67
SHA5120f5f748674f6d50916fa1b07b6c4196761a894564f9afb6ebd0f48294d09e2401c458919dc7dbd54d560a39bf65b795a565eaf0c17bc6e94e709147be65aff76
-
Filesize
1.2MB
MD5d86fc3b2e2607e40e4cddafca5e6372e
SHA1572ad3bad3c41b232b85743f96a53d22a7a2cd39
SHA25673dcc0a250a852b68a3c453d1ced3f315e44b0e58f8e5a3c68dd0fdc06c9a5da
SHA512e6a48578a6ced86da61c3b1f4b06578fce0a4f18819e9dd5f1a93eda7acfde2cd6f5cebfd142ed1208cd44d7a256d6c9c3e3ed22173ed94255283fd1bde4e03b
-
Filesize
30B
MD54eeadd9d6737578d33d7040462bd114c
SHA1f491cd0c23c037a0d272746436c372bd6b5925d1
SHA256a1b954624e54dbcb5b615c2d1c3034edc0b3c2f80eb4e672b768a7af096b531b
SHA5122dba74503b4ec175e8d8c125eedebf37a7c9bdf39c6270550626f83d05e59949294aef6e4e2d4085f89727eb940134fac7e3800c01a2eddcebc79f9baeb0c929
-
Filesize
70B
MD5f9dec578b5d874769908e4e77f0d9c7b
SHA16a1459360ab11bf2a88489912c7c384a71da913e
SHA256602e9d7291dcbe55cca6826cc58506badb13147d41e4b0191b56bdbd880ab630
SHA512ffdd13642f38892d019e6e3524a020960043e3bf9618759c74a7251c972353b9fbdb2559dcf8d39067b6d02e4dd2f59285f10eceb4444d96e609577e2bbba4ec
-
Filesize
99B
MD5360a10f556081e6efd8cf475da9233ba
SHA14660d907142a5cf3e781658e16fdbd18e2ec394e
SHA2560cfe37f35708655283e85a69afc8e1d32c291ee3104d2089616ab967be5cc79c
SHA5120ba763336c99e28fecd8f30604c095f28110abd4a7203e4d7929f58a582c6f3bae90663ed645b2d0c59440d420d9e7c37ec25a9bb96aa6517f6011b21f03a8d7
-
Filesize
153B
MD5ee0e51e9628ee46f62eb4f8d8148943a
SHA1e4fc1fb9d8c030e176b389225f4916ebc6900fb7
SHA256f4144755996ef603740923ad4ec60315dc3af809315d44134f27bff7a61e043e
SHA512c7468b51efd37881f70edea26fd9743491162ef37c3d3af423262ad36285212b9dc024e94cc1af506de7e91c03a7434173cbb8d44eb27efd435b26ad3c932436
-
Filesize
89KB
MD50d9d441ee04d1b903a3c49646e361a31
SHA17229f71008d53825e3fd7d531ebef164a7215f3b
SHA25662b362b6bc76725b870cf8323b9de82e6afe05317707e7d30c08e54556e4503e
SHA512d4f3f947e5482309450a562a11ab4737f9ff5998206f2342fad0930e7c17cf8e6e837d97a85b3ac4515b343c537aa6332ba6070f77027b62b042a2908519d563
-
Filesize
717B
MD5822467b728b7a66b081c91795373789a
SHA1d8f2f02e1eef62485a9feffd59ce837511749865
SHA256af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9
SHA512bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6
-
Filesize
504B
MD53989b20b8e2353b2ca0be103a2b8e796
SHA17839ab725e2113718cab29a3ca578b376610db1a
SHA2565e5cabce6e49b1e35cc969a719cd148bb9ad65381ff2bb5fc73e462424f7a369
SHA512bd7028a307fc751da0f7cb1daed5ada034bdc147f83cb16fc2b4b671ed7e552efead4e7af883867f1373226af3889a4098d1fd94109f33ee946b7df04beeb4b2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751
Filesize192B
MD553fbacf04ed0a801f59e2696816281c9
SHA17ea69befb0fb1d2de800563c3831bf2f487d1b84
SHA2569d0eb6767e5d1b97685da5a94ce52e75f7cd3e12b096dfa568c83a2dc710b519
SHA5129a6f016a324c82802118fc48f89e27868a99b42639a9709b3853eb3eed6bb25e96d31cc20e8dc34f01422c15165dc8abf99aaf9a5fdb8d83137cce91dd136d09
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B624848E7D0C04204BF0E664FB37FBEA
Filesize550B
MD50497e769c1df5887a8e63afb45a103aa
SHA1d63c8b802ddc06e9e508971547f73c5c33f126b6
SHA25660baeefea312decfe00cb3a9417d97dc9c567521b3e58f4de058248e13ba2bd4
SHA51237a2c150550a2602944abda0f8efa6093d4815881a099399cde4b17070777636826efb1e6f1b3b24f48d4cd79e9d33fbe9b0e4a4fa00be9228224246c8b4bb8c
-
C:\Users\Admin\AppData\Local\Temp\is-GVDGR.tmp\0b0927fadec2b004771eedddfd188b66a1a3a1f8dff1ba465d25b863893c1c90N.tmp
Filesize1.2MB
MD5e7106fbf42fbc6d5b08a18ada4f781b4
SHA136d4a629f79d772c0b0df8bd2ae2ea09108d239d
SHA25664e1f1fa7d91920b17bc7bc679a4cd8d87ff5b104318b6921bb6bf6a19055635
SHA512adf876296a952aadeb4f25211c0939bf5a278809b5d3007ad7e26c5d4975e7684d242c1b3de796efd474a47cb7ecdb80f9047935924a1108bf0e4d7c973d1845
-
Filesize
873KB
MD5a3ccbbb0735800b89931b73ccb69f9b1
SHA153c70f80017eff22ad88a53fdb3ffc518354af59
SHA25697d0684ab1ecb2f89a3c8e53dc383aede506a1f9367aa283c0b9992a19854d43
SHA512e4461a7cf5e8b8e655a2985be672af25e44276b018b7b532a665f26c1a44032bbada7e5a071a78827020c3f18d9d5c79bd0f59fe97876b1eb4279ec4094f3704
-
Filesize
183KB
MD5db25dfdd4c1f2b65c68a230881072695
SHA194cd6a3438041f0e61b0a1bea7b66461854efe69
SHA2561b66aaf1e7e3c493dd96af3b7442ea60072f6e93ba45281eacd31a14ca7e7e73
SHA512db69e4ab2218856e5184d9094e7e39705b83e3efdc15225067205c8faf6e5836145364f1d509192defa3b48864e72b9f8c0f2dc53a7adb2b86c655318b7afc2c
-
Filesize
84B
MD57ccd5a0af4da51cf4962f184fcf9456a
SHA1de37f4521fa7fee49b37898f4136728e8971ee0f
SHA2568f2374b30622dfae1fd0b9706520de34c5e1597c1531fddbff65bc0201132ac7
SHA512d7c4fbc6a4413dc457400fa2e026dea5d639a5b413164cc6939284c46bb46b6ae8ff10184ba2da4f32ace89646b026400db2a49dd9894d71e88d003a91c8267a
-
Filesize
44B
MD516786e6966ca322e10180ea944a323a9
SHA12345f5d6b3a37f6dd879eafb88072ec9e850443c
SHA25641c0e89aee81da1ac2cb5c480e7f53b1503001d33e0490db1c4484f7905bff0f
SHA5124cd4401cdad6619b34365a1bec6cce38c15742aad1098049ac9ced09686fe42392267b1a9c3e7edc0f0f91b42e2bfd94f0a975be7e0337c418d8e6813fe356eb
-
Filesize
164B
MD5adc799ec79eeaef366ea4dddf099c3ae
SHA1556c915615a34a2499604b7b732ab304b20fdd4e
SHA2567e7f18c73560f9c020abe1ab1f22705083281e2ea16ab0030fc927901b5b5d1e
SHA51276962a17cc26d3f9886828be4e43373ac530165e1c627272ed7c0bc731133e97608e55d2e31f44592aad0d0974352155f41a0718aa0666ec128406b1050c1d6c