Analysis
-
max time kernel
68s -
max time network
72s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
17-11-2024 19:37
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://github.com/phenomenon1972/Solara-Executor/releases/download/Download/Setup5.0.zip
Resource
win11-20241007-en
General
-
Target
https://github.com/phenomenon1972/Solara-Executor/releases/download/Download/Setup5.0.zip
Malware Config
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
6
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Signatures
-
Meduza Stealer payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/4816-89-0x0000000140000000-0x000000014013E000-memory.dmp family_meduza behavioral1/memory/4816-88-0x0000000140000000-0x000000014013E000-memory.dmp family_meduza behavioral1/memory/4816-90-0x0000000140000000-0x000000014013E000-memory.dmp family_meduza behavioral1/memory/4816-91-0x0000000140000000-0x000000014013E000-memory.dmp family_meduza behavioral1/memory/3308-113-0x0000000140000000-0x000000014013E000-memory.dmp family_meduza behavioral1/memory/4816-114-0x0000000140000000-0x000000014013E000-memory.dmp family_meduza -
Meduza family
-
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
Processes:
setup7.0.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 12 api.ipify.org -
Suspicious use of SetThreadContext 2 IoCs
Processes:
setup7.0.exesetup7.0.exedescription pid process target process PID 4712 set thread context of 4816 4712 setup7.0.exe setup7.0.exe PID 4064 set thread context of 3308 4064 setup7.0.exe setup7.0.exe -
Drops file in Windows directory 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Windows\SystemTemp chrome.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
Processes:
chrome.exedescription ioc process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133763458364256270" chrome.exe -
Modifies registry class 1 IoCs
Processes:
MiniSearchHost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
NTFS ADS 1 IoCs
Processes:
chrome.exedescription ioc process File opened for modification C:\Users\Admin\Downloads\Setup5.0.zip:Zone.Identifier chrome.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
chrome.exesetup7.0.exepid process 3376 chrome.exe 3376 chrome.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe 4816 setup7.0.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
chrome.exepid process 3376 chrome.exe 3376 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
chrome.exedescription pid process Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe Token: SeShutdownPrivilege 3376 chrome.exe Token: SeCreatePagefilePrivilege 3376 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exepid process 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
chrome.exepid process 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe 3376 chrome.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
MiniSearchHost.exepid process 652 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
chrome.exedescription pid process target process PID 3376 wrote to memory of 4360 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4360 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4404 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4984 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4984 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe PID 3376 wrote to memory of 4000 3376 chrome.exe chrome.exe -
outlook_office_path 1 IoCs
Processes:
setup7.0.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe -
outlook_win_path 1 IoCs
Processes:
setup7.0.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4249425805-3408538557-1766626484-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 setup7.0.exe
Processes
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --disable-background-networking --disable-component-update --simulate-outdated-no-au='Tue, 31 Dec 2099 23:59:59 GMT' --single-argument https://github.com/phenomenon1972/Solara-Executor/releases/download/Download/Setup5.0.zip1⤵
- Drops file in Windows directory
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdc20acc40,0x7ffdc20acc4c,0x7ffdc20acc582⤵PID:4360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1900,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1896 /prefetch:22⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1552,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1944 /prefetch:32⤵PID:4984
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:82⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3048,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3060 /prefetch:12⤵PID:4232
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3032,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3088 /prefetch:12⤵PID:3036
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4664,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4676 /prefetch:82⤵PID:72
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4316,i,5396725536055567501,1691355112717553309,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4356 /prefetch:82⤵
- NTFS ADS
PID:4744
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:676
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:2776
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2020
-
C:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exe"C:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exe"1⤵
- Suspicious use of SetThreadContext
PID:4712 -
C:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exeC:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exe2⤵
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- outlook_office_path
- outlook_win_path
PID:4816
-
-
C:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exe"C:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exe"1⤵
- Suspicious use of SetThreadContext
PID:4064 -
C:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exeC:\Users\Admin\Downloads\Setup5.0\setup7.0\setup7.0.exe2⤵PID:3308
-
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:652
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD53c1b2875508aa5bd2b09930f743402c8
SHA1e9d07def035dec8a16b5800f74c163049b711a99
SHA256fb91b721ced42b0c3a556a8d4b5dacbc9e735ae4b560a40e14514e7b8dc1f491
SHA5129abfeca5bdb323c543f503ad5338d7a49657794c5f978f1a6a7430b7a6ba509d9fc7f4224f42a83adad7f4449282499b403b523315cb5a6f4cf556bac7a56453
-
Filesize
160KB
MD571bc6c452b724a0a9a2fb7453d1d686e
SHA1730162bfce634030eedbec1a5d4afdc9b0168700
SHA2569b2d4fd1fa1400ea3a2433741f40240ab13d50286b4a666a8e89fd9323632f04
SHA512833e7da2f02a185d6ee71c4016f182ac8665d0fa4e8d156ac8ed85631440627de7215d174f15c257ae09be65e041884aea9513bea89367277b5b493cdf99d925
-
Filesize
332B
MD5090b2ce7c65f351c1e59519d36af4b75
SHA1d589cebcb66f494bf0db466d1454ec8ab47e75bc
SHA2566e45ba9c99a9cbeab6917319b1809b34a177957536dab8e86a2452c40e754a99
SHA512a00bdad75f055911dab3c64e6c472477185442084cd407891685488d47cb4d2ae600c6f988b0631f10f906f93ab984dccf633f09dd68a3204bc038b66a8a8fc9
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\52d17b22-af61-486d-99b2-3027931514b5.tmp
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
2KB
MD576ab698ae1f369a38c5c16577fc74866
SHA1494fb80b0830fa6bd6cd0c6943cbce9d1a8cfc73
SHA256b3c216084e039a529ed69aec01ec5dbf0abbf68f0710297c9a3d72a584a1c0db
SHA512b13494d1014b7d71265ae51e5c8c9d09c15f9d9d8e0cc0ff3d93c25967dcdfa7a35e073b0ac5c7413f731d56ecc9728ef325f71541d22420df95e44436cde044
-
Filesize
523B
MD5a4ba79d7e822ef1993e6dc215e68d835
SHA1fb4ea4c6af6a2c27679c13a2bee736ab4a856425
SHA25678d08da2773cfd72535fa5da42169ac2b04b130c0d2e5eb69289349d2f9b2b06
SHA51234e9877e91a66845f5cde35c9a106b4d734d58a2351630ba6e224595527c6604b5c169e53a52468d3910014e7a39d179f882e9e854a74a2f4a4e4ac93b54ccc5
-
Filesize
9KB
MD549a6d4b42f1522ef290cb7a29244b079
SHA1ab2b3eaa3fe9a54ae5422f98a34f869d369dd678
SHA256f3125c1a5f1c7528ce51b2a509e56248fcf4edd5e2f3528d00c94ecdd6d550f2
SHA5125c7cb2b09ccd824bb001726e989664d6045f9a58ff7a3506c88b3e0f4e08329d452f5ffccdfe9e49780e40feab92fb53e77e71c9d064a95cf6aeafeab5da2322
-
Filesize
9KB
MD5d3f3631c146997248e309807940ff9cb
SHA1ed26ca53f1d6d33492f547ee754c581a631e2704
SHA2566a03e49551ea481761aadbd9fe280a7244ccba795778f9fa2203c0ca2c10803e
SHA51283188a55a9f821d250a0145dd40ce575da11589ed150f840ca6ce1ec2ce10bd7374e4e67fc185eb72e4a0214eb6e0a061567d0773e97cde96d098d1325e5031b
-
Filesize
9KB
MD55c190b6b86350b7b516b1f64ce28bdad
SHA1e9209cd8759970a5423a8410ed3f94fd84951c86
SHA25691168663a6edf4b784fd644aec7851b27d801f79ffb5efa9b1570d40c8a2c31a
SHA512536133e08e4ab2fa8e28741649dcf55d270a3e344b9f3287872d74f1ef195233651267283469a2482c06af1d8b9a9d9fcf0e02b8570d5741e4a7874f08990393
-
Filesize
9KB
MD5f5c0dc890bf4fa480037c1d931cfda32
SHA1307a19fc10b2af36b2cbd049ef96d5c5bfeef975
SHA256df49b4406c866f2afe8715138ef9d30ee1520aaf1dd6da768e75d7f5d70be53f
SHA5124399418c4bf7fe6e35cf45451d400703073634d4e7ed117c13d3ec6c26a60596c797938713e38a12588493a6756787f10f33972339aa4f75c7bcb8db2e44e9b8
-
Filesize
228KB
MD5d16edff631957f8d4113388965ec5bd1
SHA18c1b30d1ecb84ec2aa4f9cda067ce31e249b4652
SHA256ee765be05dd48fbc02a8fe16080ee96f004b9df01d83347b29a01110d02b7aa0
SHA512a0990a8fef00d0e49f4793a5b23d6a67a318cb0c23acd5e0445414a06b03cda5876dca07bd193acf48b1ec29653985e415ad6e0ad00573f43a86c38e3c284587
-
Filesize
228KB
MD5fa2e6e214c7217b5a827e0bd946d893e
SHA1715819370997ae100825449ea5bf371bfeca6f23
SHA256ffff845abdcac2d0017f8b10d48a5394cf81c38a5649c768dc62387845fc1245
SHA5121f47d28e6d56bf042e71cfaaa69e1e57d4fdffd25a51dbbdf85c27a213262c3ceeaec349f7e4d307ea13370ccbe2e1e3fb361eed8672b14f498d7907ae7f43af
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD596329c73cc49cd960e2485210d01c4d2
SHA1a496b98ad2f2bbf26687b5b7794a26aa4470148e
SHA2564c159cab6c9ef5ff39e6141b0ccb5b8c6251a3d637520609dfbdd852fa94d466
SHA512e98736a879cad24c693d6c5939654b2fd25bf9d348f738668624214f22d541a9b781c967201ab2d43cbac9207946824a0299d482485f4b63c48d5d2a839e5baf
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5847a64ce22adca83e091e5403ef844ed
SHA1f2cf8559f0eba3d237cee1162b811613d2a0c308
SHA2561db255895b125edbed50b5296edafaf303dde2b93a600313b6a1aa61f9ec2b88
SHA51294abff56e498bfd7af0e72a652a0b03d29cbe7d0322f43cb8fa4182cfa829ec6d608c5bb3f6deaaf1dcaae764c90036beedb503109c8080999dfaf2d6a2e9de6
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e