Analysis

  • max time kernel
    55s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-10-2024 01:36

General

  • Target

    Melibiose.ps1

  • Size

    53KB

  • MD5

    1f737850c90e5d135b2a519df3ce86a4

  • SHA1

    3d539ea4291810b1191eb671d8369b0cfa6d6f1d

  • SHA256

    dbc22a96f5153282b6037375b64d01887dbf9b978dd5eada76eaba847d8e7a3f

  • SHA512

    677a27533f8505de074c2237fba524f250c6db2c5a02b9b89341a49cd49ea6ccca1126d5964de025414fcf2fac58aee798f2c5c1536ab80a8ada088f1fd85996

  • SSDEEP

    1536:PVYsfFw+Y9sUEAhh4Dp2UrjvFBnGOkrq3GyY6GBTU:dH97NNAhh4t2U3ZYarY6qTU

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 11 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 18 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 19 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    powershell.exe -ExecutionPolicy bypass -File C:\Users\Admin\AppData\Local\Temp\Melibiose.ps1
    1⤵
    • Command and Scripting Interpreter: PowerShell
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:5036
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1048
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2784
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2388
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3080
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3912
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of SendNotifyMessage
    PID:2316
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4328
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:452
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:4732
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2584
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4392
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4568
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1220
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5036
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:3912
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3400
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1380
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:3964
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4992
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3232
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:2260
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1444
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4312
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4992
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2388
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:4360
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1672
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4132
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2696
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Modifies registry class
    PID:3648
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
      PID:980
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
        PID:4120
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:4140
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3056
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:316
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:3300
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:1548
                • C:\Windows\explorer.exe
                  explorer.exe
                  1⤵
                    PID:3988
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    1⤵
                      PID:3808
                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                      1⤵
                        PID:4300
                      • C:\Windows\explorer.exe
                        explorer.exe
                        1⤵
                          PID:4040
                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                          1⤵
                            PID:4036
                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                            1⤵
                              PID:1028
                            • C:\Windows\explorer.exe
                              explorer.exe
                              1⤵
                                PID:4784
                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                1⤵
                                  PID:4864
                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                  1⤵
                                    PID:1964
                                  • C:\Windows\explorer.exe
                                    explorer.exe
                                    1⤵
                                      PID:1700
                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                      1⤵
                                        PID:3920
                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                        1⤵
                                          PID:2472
                                        • C:\Windows\explorer.exe
                                          explorer.exe
                                          1⤵
                                            PID:5076
                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                            1⤵
                                              PID:764
                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                              1⤵
                                                PID:4772
                                              • C:\Windows\explorer.exe
                                                explorer.exe
                                                1⤵
                                                  PID:760
                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                  1⤵
                                                    PID:452
                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                    1⤵
                                                      PID:4132
                                                    • C:\Windows\explorer.exe
                                                      explorer.exe
                                                      1⤵
                                                        PID:4296
                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                        1⤵
                                                          PID:4384
                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                          1⤵
                                                            PID:4604
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:1056
                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                              1⤵
                                                                PID:544
                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:3664

                                                                Network

                                                                MITRE ATT&CK Enterprise v15

                                                                Replay Monitor

                                                                Loading Replay Monitor...

                                                                Downloads

                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                  Filesize

                                                                  471B

                                                                  MD5

                                                                  a3177160ffd85a7129c142023e84c247

                                                                  SHA1

                                                                  95e8fa08b0dd6689cef19afe679b3fce88bc2edf

                                                                  SHA256

                                                                  42745bc7232d6bf4c5d21732bcabb6cc6721feeac9aeb80e45e57832464d19ca

                                                                  SHA512

                                                                  45aed26b69a001902b2e8a6734d754f93b27cb128887632d2844a5c27b154afe20e9b90aaa4a02ba1c24aa244fc9d5088671811fc459e248823bad670cc6ddcb

                                                                • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                  Filesize

                                                                  412B

                                                                  MD5

                                                                  863f479e5b35d009fea1de89661c7a6c

                                                                  SHA1

                                                                  bbec039a1d484e4a25b6cd1ecde69b81ac61bcc6

                                                                  SHA256

                                                                  8e431a7f173f68d5cecdbcffb1044dec6735c8bc73621a24fdac750f8316cd16

                                                                  SHA512

                                                                  e10cdc7bf11e511f2eb9e96a143d88730d1a92d53616b986bd0d149acb803d504e6ae39d2dee6cc7bc08363040bc19753b0ecfdc5ad58a2aca8b1f7263d9a21b

                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                  Filesize

                                                                  2KB

                                                                  MD5

                                                                  9b40e5c26e6074163bda2a52bb9dffbe

                                                                  SHA1

                                                                  bb409307bb85f52f378a0b7945f49094aa977183

                                                                  SHA256

                                                                  4c7c6940918e9b13631feb57761602790a98b69d8258c72e3490ca1640caa7cb

                                                                  SHA512

                                                                  03c5a6bba09d3806581fbc7eab4d05213a318c4bc295a38a81e634c031cb09230db73b79378427a7e32e4e8c3e574f76c94a1cc03bcbb921e5e72d8821f55cb7

                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{2F519BF2-C697-59F8-8F6A-1E19509CE66B}

                                                                  Filesize

                                                                  36KB

                                                                  MD5

                                                                  8aaad0f4eb7d3c65f81c6e6b496ba889

                                                                  SHA1

                                                                  231237a501b9433c292991e4ec200b25c1589050

                                                                  SHA256

                                                                  813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                                                                  SHA512

                                                                  1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

                                                                  Filesize

                                                                  36KB

                                                                  MD5

                                                                  ab0262f72142aab53d5402e6d0cb5d24

                                                                  SHA1

                                                                  eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

                                                                  SHA256

                                                                  20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

                                                                  SHA512

                                                                  bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

                                                                • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133741210275924302.txt

                                                                  Filesize

                                                                  74KB

                                                                  MD5

                                                                  46eef9842a351287141a41fdeccc41b7

                                                                  SHA1

                                                                  c2ba4bf5a48604bd0d3eb4e5b2a1ba352313166f

                                                                  SHA256

                                                                  bf52ff74677eaa4c4328d9e0ea50129012449c515259d62976c16450695c27e4

                                                                  SHA512

                                                                  7d46a6960b01402ff7889e1812c790aae29693207fda7b92c5665d7fc8010ca6aa20a10a632f342ab34f2aa3bf25cbd8b3d9e6a86f4a2111ed6dca881ccd9fb6

                                                                • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\80AM9X7C\microsoft.windows[1].xml

                                                                  Filesize

                                                                  96B

                                                                  MD5

                                                                  c839a1973d3feaead377ea2dad131fe6

                                                                  SHA1

                                                                  252758616792b9b2f10bc460c84b1c1eba75ea04

                                                                  SHA256

                                                                  efecd8d483398a6cb569af17e66cb0ba1ca4b9c65f4a697fc7642cc007fc3ccd

                                                                  SHA512

                                                                  fee6ca3d2ae272b0f1f291e98830215f2ac138747651be78325ab7c1ba3f01f72cbfed4c886853caba45f16c59c78543a87a5f872b2c1f85bffa3a4e11bf50e1

                                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_32kgyoeo.bxv.ps1

                                                                  Filesize

                                                                  60B

                                                                  MD5

                                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                                  SHA1

                                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                                  SHA256

                                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                                  SHA512

                                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                                • memory/316-1504-0x0000000004AD0000-0x0000000004AD1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/452-189-0x000001926CB70000-0x000001926CC70000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/452-226-0x000001926E0A0000-0x000001926E0C0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/452-206-0x000001926DA90000-0x000001926DAB0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/452-191-0x000001926CB70000-0x000001926CC70000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/452-194-0x000001926DAD0000-0x000001926DAF0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/452-190-0x000001926CB70000-0x000001926CC70000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/1380-664-0x00000198C9600000-0x00000198C9620000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1380-642-0x00000198C8500000-0x00000198C8600000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/1380-640-0x00000198C8500000-0x00000198C8600000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/1380-645-0x00000198C9640000-0x00000198C9660000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1380-676-0x00000198C9A00000-0x00000198C9A20000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/1672-1218-0x0000000004C20000-0x0000000004C21000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2260-926-0x0000000004D40000-0x0000000004D41000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2316-187-0x0000000002F40000-0x0000000002F41000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2388-29-0x00000000046D0000-0x00000000046D1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/2696-1238-0x0000018C2A5A0000-0x0000018C2A5C0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/2696-1255-0x0000018C2A9B0000-0x0000018C2A9D0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/2696-1221-0x0000018C29500000-0x0000018C29600000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/2696-1224-0x0000018C2A5E0000-0x0000018C2A600000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/2696-1220-0x0000018C29500000-0x0000018C29600000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3056-1401-0x000001C2038C0000-0x000001C2038E0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3056-1389-0x000001C202FA0000-0x000001C202FC0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3056-1364-0x000001C202500000-0x000001C202600000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3056-1369-0x000001C202FE0000-0x000001C203000000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3232-806-0x00000183E2290000-0x00000183E22B0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3232-822-0x00000183E28A0000-0x00000183E28C0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3232-791-0x00000183E22D0000-0x00000183E22F0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3912-35-0x000001AFCAEF0000-0x000001AFCAF10000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3912-32-0x000001AFC9F00000-0x000001AFCA000000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3912-638-0x00000000047A0000-0x00000000047A1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/3912-30-0x000001AFC9F00000-0x000001AFCA000000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/3912-55-0x000001AFCAEB0000-0x000001AFCAED0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3912-66-0x000001AFCB2C0000-0x000001AFCB2E0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/3964-783-0x0000000004B70000-0x0000000004B71000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4120-1362-0x00000000031B0000-0x00000000031B1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4312-934-0x0000024575960000-0x0000024575980000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4312-962-0x0000024575D30000-0x0000024575D50000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4312-961-0x0000024575920000-0x0000024575940000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4360-1080-0x0000015796200000-0x0000015796300000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/4360-1079-0x0000015796200000-0x0000015796300000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/4360-1115-0x00000157976B0000-0x00000157976D0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4360-1092-0x0000015796FA0000-0x0000015796FC0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4360-1081-0x0000015796200000-0x0000015796300000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/4360-1084-0x0000015796FE0000-0x0000015797000000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4392-370-0x0000017ECCD50000-0x0000017ECCD70000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4392-347-0x0000017ECCD90000-0x0000017ECCDB0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4392-342-0x0000017ECBE40000-0x0000017ECBF40000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/4392-379-0x0000017ECD360000-0x0000017ECD380000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/4392-344-0x0000017ECBE40000-0x0000017ECBF40000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/4568-492-0x00000000044F0000-0x00000000044F1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4732-340-0x0000000004170000-0x0000000004171000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/4992-1078-0x0000000004CB0000-0x0000000004CB1000-memory.dmp

                                                                  Filesize

                                                                  4KB

                                                                • memory/5036-494-0x000001749F580000-0x000001749F680000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/5036-19-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-499-0x0000017CA16E0000-0x0000017CA1700000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/5036-496-0x000001749F580000-0x000001749F680000-memory.dmp

                                                                  Filesize

                                                                  1024KB

                                                                • memory/5036-0-0x00007FFF48353000-0x00007FFF48355000-memory.dmp

                                                                  Filesize

                                                                  8KB

                                                                • memory/5036-531-0x0000017CA1AB0000-0x0000017CA1AD0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/5036-20-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-508-0x0000017CA16A0000-0x0000017CA16C0000-memory.dmp

                                                                  Filesize

                                                                  128KB

                                                                • memory/5036-18-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-16-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-15-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-14-0x000001EFD36D0000-0x000001EFD36F4000-memory.dmp

                                                                  Filesize

                                                                  144KB

                                                                • memory/5036-13-0x000001EFD36D0000-0x000001EFD36FA000-memory.dmp

                                                                  Filesize

                                                                  168KB

                                                                • memory/5036-12-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-11-0x00007FFF48350000-0x00007FFF48E11000-memory.dmp

                                                                  Filesize

                                                                  10.8MB

                                                                • memory/5036-1-0x000001EFB8CF0000-0x000001EFB8D12000-memory.dmp

                                                                  Filesize

                                                                  136KB