Analysis Overview
SHA256
c79f2f6cd70358a2df2382bcb191aa6f22ba0d17d547e1e2c4350d0546c9be24
Threat Level: Known bad
The file c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118 was found to be: Known bad.
Malicious Activity Summary
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
Loads dropped DLL
Checks BIOS information in registry
Executes dropped EXE
Deletes itself
Unsigned PE
Enumerates physical storage devices
Program crash
Browser Information Discovery
System Location Discovery: System Language Discovery
NSIS installer
Suspicious use of SendNotifyMessage
Modifies registry class
Suspicious use of WriteProcessMemory
Modifies Internet Explorer settings
Enumerates system info in registry
Suspicious behavior: EnumeratesProcesses
Suspicious use of SetWindowsHookEx
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
Suspicious use of FindShellTrayWindow
Suspicious behavior: GetForegroundWindowSpam
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-12-04 16:17
Signatures
Unsigned PE
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Analysis: behavioral5
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240903-en
Max time kernel
15s
Max time network
17s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2172 -s 244
Network
Files
Analysis: behavioral10
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4680 wrote to memory of 2432 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4680 wrote to memory of 2432 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4680 wrote to memory of 2432 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 2432 -ip 2432
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 181.129.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 22.49.80.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral11
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240729-en
Max time kernel
15s
Max time network
16s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisdl.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisdl.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 224
Network
Files
Analysis: behavioral22
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
151s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4276 wrote to memory of 4744 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4276 wrote to memory of 4744 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4276 wrote to memory of 4744 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4744 -ip 4744
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4744 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 133.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral23
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240903-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2520 wrote to memory of 1848 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1
Network
Files
memory/1848-0-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1848-1-0x000000001003F000-0x0000000010040000-memory.dmp
Analysis: behavioral6
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
95s
Max time network
146s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3016 wrote to memory of 1248 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3016 wrote to memory of 1248 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3016 wrote to memory of 1248 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 368 -p 1248 -ip 1248
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 636
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.129.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral7
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240903-en
Max time kernel
121s
Max time network
122s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 224
Network
Files
Analysis: behavioral9
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20241023-en
Max time kernel
121s
Max time network
123s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 224
Network
Files
Analysis: behavioral12
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
93s
Max time network
149s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 3068 wrote to memory of 764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3068 wrote to memory of 764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 3068 wrote to memory of 764 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisdl.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nsisdl.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 356 -p 764 -ip 764
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 764 -s 628
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 212.20.149.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 85.49.80.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral21
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20241010-en
Max time kernel
119s
Max time network
121s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 224
Network
Files
Analysis: behavioral2
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Loads dropped DLL
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 71.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | udp |
Files
C:\Users\Admin\AppData\Local\Temp\nsqC823.tmp\System.dll
| MD5 | 960a5c48e25cf2bca332e74e11d825c9 |
| SHA1 | da35c6816ace5daf4c6c1d57b93b09a82ecdc876 |
| SHA256 | 484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2 |
| SHA512 | cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da |
C:\Users\Admin\AppData\Local\Temp\nsqC823.tmp\InstallOptions.dll
| MD5 | 714e0ecd29f9ec555f350f38672726c7 |
| SHA1 | 555b1492e782d7a30f280f2aecb64c642c1aaad3 |
| SHA256 | 21fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3 |
| SHA512 | ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312 |
C:\Users\Admin\AppData\Local\Temp\nsqC823.tmp\ioSpecial.ini
| MD5 | d12e782f5fb1dbae8bb5b2acf4a2ae95 |
| SHA1 | a7e7ed56eb55728770aa0b45637c88a54dfcfe27 |
| SHA256 | 03ebdb430ffccd20609fec5621cde190c99fed8bc7e7b314b522350479cf1253 |
| SHA512 | d33beb0a0b415ad3a6f7675e72875c47b8d01f968c72f69417ad06d60586572625f5c050d5c025dbcbba53027243adf5daa8fab77793d200f29c3628054acede |
C:\Users\Admin\AppData\Local\Temp\nsqC823.tmp\StartMenu.dll
| MD5 | 28052e87fc73e2aad1db2db35eba62e7 |
| SHA1 | 72e4c599b45605e36aa5fe7b39caf1eba531328f |
| SHA256 | ca0b34b6d8ea4638f620f250539301164b6a300f679b96e22a0b1f03f5e56440 |
| SHA512 | 7759923e6c29a43dedee73ae0540d47b33a2861d6f3c0520deb90d068978494dbf01dde2974413699b2008306dbd753bdefdb5a78d4745d064ad6a5a3163fed2 |
Analysis: behavioral14
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
148s
Max time network
146s
Command Line
Signatures
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\TypeLib | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\ThreadingModel = "Both" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Programmable | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Implemented Categories | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\ = "C:\\Windows\\SysWOW64\\msvidctl.dll" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B} | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ = "BDA Tuning Model Digital Cable Locator" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Version | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\VersionIndependentProgID | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\VersionIndependentProgID\ = "BDATuner.DigitalCableLocator" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Implemented Categories\{0DE86A54-2BAA-11CF-A229-00AA003D7352} | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ProgID | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Version\ = "1.0" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ProgID\ = "BDATuner.DigitalCableLocator.1" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\TypeLib\ = "{9B085638-018E-11D3-9D8E-00C04F72D980}" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Token: 33 | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Windows\system32\AUDIODG.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\CI3.exe
"C:\Users\Admin\AppData\Local\Temp\CI3.exe"
C:\Windows\system32\AUDIODG.EXE
C:\Windows\system32\AUDIODG.EXE 0x2e0 0x4ac
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.129.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 134.32.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
memory/2244-0-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-2-0x0000000002C00000-0x0000000002E00000-memory.dmp
memory/2244-8-0x0000000002C00000-0x0000000002E00000-memory.dmp
memory/2244-12-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-14-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-15-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-18-0x0000000002C00000-0x0000000002E00000-memory.dmp
memory/2244-17-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-16-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-11-0x0000000000400000-0x0000000000841000-memory.dmp
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | fd13f67c6b6182fcc139c22ea2e5533d |
| SHA1 | ec7e15a544cb1b925e315f6c37e32f205738e58b |
| SHA256 | 8a94cc1f4400f4c67e76759fec9045721f919613ccaa3831e2668a3c5992dad5 |
| SHA512 | 192df534c9a28fbef4c8885b7fab420bf20e058b82a5369db085b28b6644d3e56b7e90b3fcb18e99e380950fb7f88c1088080f86a960d57a4bf7f0b83fa77bcd |
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | 7578973bd9ff088c211d5014b730a16c |
| SHA1 | d9ba76c07fdf1f6452ea86b3a748d65e4bccb21a |
| SHA256 | c7ec425954cffb9fa8bd71861b67eb051a662ce4d504a64683499c4f9d99874c |
| SHA512 | 0300874244c7defac70d09208daebdd0bf0c24eda6ce29e581a38d0caa0dc0a8006d06cd51f6e69b40d845672dc34bd5d4d30911a3e08daabc12ae0987963f06 |
memory/2244-95-0x0000000002C00000-0x0000000002E00000-memory.dmp
memory/2244-94-0x0000000002C00000-0x0000000002E00000-memory.dmp
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | 888ef788e9638027cdb6eeb0332067d8 |
| SHA1 | 41b6955f86dd527ab09ec481281e43247b9e52c6 |
| SHA256 | 0d2888b864984e6f414451f7fdeb3c287d4584e8b1cdf62d4ca823c283f65eca |
| SHA512 | 2b1d9b9c2e5831cd6d16dae7c4c8ea763984bb63d9573fe2bd71f9ad5d54e510be88a4de976d8890c26a8282c6af794a1b3e9bc0af0fedcd9f89d7e1e3c91371 |
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | a31293afbcdaec4c6ddb6cab0d2b1aef |
| SHA1 | 5bf1c5f871dc7f1e8c84b97c1ea331218ff12fa1 |
| SHA256 | 11b7ae28b7939eef8b7354f3a4724cbc83f08ef5ac9eb08f6e5db44af9f30172 |
| SHA512 | c7696ccb719b4f0362976a97d971cbdbb053c753143ec70756d47d7dc3c69cc83e1fd90057244901add001b6fb31d3002472621dd2edb70d93276f0f70007ec8 |
memory/2244-116-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-118-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-117-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-120-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-119-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-122-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-121-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-124-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-123-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-126-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-125-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-128-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-127-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-130-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-129-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-132-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-131-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-134-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-133-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-136-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-135-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-138-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-137-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-140-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-139-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-142-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-141-0x0000000000400000-0x0000000000841000-memory.dmp
memory/2244-144-0x0000000010000000-0x0000000010040000-memory.dmp
memory/2244-143-0x0000000000400000-0x0000000000841000-memory.dmp
Analysis: behavioral25
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240708-en
Max time kernel
120s
Max time network
135s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IntelliForms | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Zoom | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\PageSetup | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{4A141971-B25B-11EF-85B7-D6CBE06212A9} = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "439490933" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\InternetRegistry | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\IETld\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = b03a931e6846db01 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (str) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (int) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb010000001cfbf6e409790a4580438be52e21a5d0000000000200000000001066000000010000200000009fbac8a7bc8815393119c83ea9de33b4e1e41ebbbb79eda84dd130a2b8f323f0000000000e8000000002000020000000be51da4834a5e7add0da924eecdd0270a61eb051b6af395c0f8a8de92cba73e7200000007e34e19621f89bb71dc84f9ad7d7eeffc7cc655f49a556daac615b86fd4570234000000027b186f331433bb22b72a8ed023e55c660a74b0403da9d05d82b525b4868be00d72b226107ec754214b861faa428990ee68db8c8f26a22bdb1631f832777fed2 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Set value (data) | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\DomainSuggestion | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Internet Explorer\GPU | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files\Internet Explorer\iexplore.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
| N/A | N/A | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2568 wrote to memory of 1936 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2568 wrote to memory of 1936 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2568 wrote to memory of 1936 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
| PID 2568 wrote to memory of 1936 | N/A | C:\Program Files\Internet Explorer\iexplore.exe | C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE |
Processes
C:\Program Files\Internet Explorer\iexplore.exe
"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\readme.htm
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2568 CREDAT:275457 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
| US | 204.79.197.200:443 | ieonline.microsoft.com | tcp |
Files
C:\Users\Admin\AppData\Local\Temp\CabD184.tmp
| MD5 | 49aebf8cbd62d92ac215b2923fb1b9f5 |
| SHA1 | 1723be06719828dda65ad804298d0431f6aff976 |
| SHA256 | b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f |
| SHA512 | bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b |
C:\Users\Admin\AppData\Local\Temp\TarD243.tmp
| MD5 | 4ea6026cf93ec6338144661bf1202cd1 |
| SHA1 | a1dec9044f750ad887935a01430bf49322fbdcb7 |
| SHA256 | 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8 |
| SHA512 | 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | b0f7221f8223e7acf53c6df7877859e9 |
| SHA1 | dfd6e999f8ee589f13862943c2677f9061fe0af9 |
| SHA256 | 97043ec81d72b94af420f1654464a25cf1130d358729a698892b7e54c88e1082 |
| SHA512 | 2655c3c4cdcb489d8225f30e10103734ac28c1401c421633e8b6f22a6d42591bc3447ea344e9253b88fbfc72aab00e3af22c8a84a9b79be1d4bd18628918c32d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 78ce3ca838a85d5971e2c4f12ab44283 |
| SHA1 | b7233d8c68cdc4748fb4868b03f8e69e9cb2ddef |
| SHA256 | 80238516b7d13f48a8ba097836c3e98d9731dae488a000e48f2d9a3fe8e9f5bf |
| SHA512 | 1eefb0215b0f606ec938bce375b3ec4a7453342578c051935f77d828500f4baf335bfeaf17a46f68adf420f4b88c519b8f109d29dfab8ebe56bf059574228477 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 5cfcecaa1a8830e274e43c3aec82353d |
| SHA1 | 6214675f6f1daaacabd551c6c86094ffa0236598 |
| SHA256 | 5aa3485495d62998635aecea281cd9ea6cebe48b49733d243917105b8ab7a28e |
| SHA512 | 14eb01663b992a7636ef8ecbf8ad385da3dfd7a338870b69ad119b6919bd6850016938935aac0152ff6a60ccc6804cf97c63e1cb91d4f6a20073aa892d3c0602 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 43f37a436f4d3dec259a9c01a20eaf2f |
| SHA1 | 3dc44308e45079a0dd1770eb64f1dde4d9ac4171 |
| SHA256 | ad5dc06a869ad6ae5290566e1d8dd5a03a498a6f91e39bc0eed2bb80aa4115d2 |
| SHA512 | 91a84b0de78eeafb522b77958d2424d9ebab00b57aba1683ab8790013d8b1c01b840f51d133872a5587f227552b3df727b990423c59736e847f0bb55ad0a286b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | faa8adde7684b00497f53bfaa8066497 |
| SHA1 | 799591a005bce4ace7407821f7e68537d1119048 |
| SHA256 | dd5ccada9f8b384b0c277836cc524c4d09b9a30cb951b68de706f6804f53e307 |
| SHA512 | 630e9f09b559c48490a313a96f30c3b5a264a5fd91cbe1d8d6edfb14dc7c7e080c5a8bbc40f018fc1ed4653993d5f5da033698d7d9c2c5939cd12d532bb7d474 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | beec7b7651d67e0317f75f8fd81c23d4 |
| SHA1 | 406e99edf35d5500918478c09b5b835c740dad20 |
| SHA256 | f41f49d0fa58128293d08d9e3e85d200d6d687e58a7da2a183dc27a8c3e68d28 |
| SHA512 | e173d8e6eea1f81c804865ee94d058e5522528c2ff316c9b410aa70c4819743976c97fa82f4254706ac555d47a07171edfb26163ffef064af242298bb835ac1b |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3758e4493184326cb586eb959a915af1 |
| SHA1 | 96934e16e63daaadf77e0bedb2c76dd98d6800bd |
| SHA256 | f0367d93c1c37f27356aa849e8ce255f666a552f430b1813690f2690f6f7eaee |
| SHA512 | bd1f0e86696a37a59b85daabf4f0a49530425ef7ad12c6c684aaaab1811c3c698ab18f1dcaa74d47385e0c85f7089d6ee67f7d362375623f347a388f1ad52238 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 22c38736604c5e211654af7a8fa85926 |
| SHA1 | a64696891fa94ae7ebc348d894c00591bda1af6f |
| SHA256 | 7e6a2943d611cdae982edf7d7f03ff0518d77c6147efdc2c17d2d5e9c1180ae5 |
| SHA512 | e7e634b0ad8680903aeb51a1efca1dea352a7c2943f8a5c039ddc7c5e17fe5462fe263babf3504a5f40cfa8f8c9a6be3af21541ae98a75f7845aa9e880c6a009 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | ec83ece8cf020e7676e81bcdba2a2790 |
| SHA1 | d82f0d80d78d7df1185cf7637ed7374a75357349 |
| SHA256 | e06c4c7a4fdf6d1104a722bde9d8f488836092e091cfef291157768ee157cfb7 |
| SHA512 | 4b4c41a15a38ade4caf3d92d9570ea78cfde9ee63f7ba545f9b9305aaa2354ed39825f70d5d22807c1ac939a9729f0feb533e7c4fa717daa9e953a774fbaba11 |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 3dce69d2587103d1334b0ed1712dccb9 |
| SHA1 | 60e756888c7f8dc9e6e6e7ad13edb6127f4be606 |
| SHA256 | 31b4fad6f0bf481ab980457c02831ff472818b28cc6cdea54f948580e573e3a7 |
| SHA512 | 19373b4a529fcc2d298e452edccbec1357794e23aa2aa7205845b8d78b3c33a761704d9ba4a54aaa9cb7b51dfb9f9aeccd8696785559ed62729ca2d1d097fcff |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 1c23a3c84d8050ed704c4cb21bc7db40 |
| SHA1 | 2f67cf28e49998fa885efbc2f7ee09f6b6215f92 |
| SHA256 | 16587a294a2e0f4ef5818f2840f7a08671895ec89e6d1414f64e873204b43b0c |
| SHA512 | 49563fb484e7b6cdfea24189b3daf59b51a51ef8ca261ed82bf52b10593dafda31c14f2fe365ba8961c8bc6f3f4422e03e903d8482c1b6128d0fd5ae30a9d28e |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 9b6173c1a5f42ad97b8864c46e26f992 |
| SHA1 | 70a141d443982c2c92d58bc70dda01409680a4f5 |
| SHA256 | 9c4d5f82c4f8d4f710681e642c1351d6a8c0e0b4c2d771120ea0ace6e5dd0b12 |
| SHA512 | 5b59e719eedceff7a7685e1d9cee7913a304ea524880f807a48f3b5dad6c698867487af9159f4c8ee35550f3398236ff0f7003d27b37239dc0068dd41085235d |
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
| MD5 | 588cc801c01421a447afc21a0cf22e84 |
| SHA1 | 30c6eafa291f17619ea211bc5a3ca179e7b83524 |
| SHA256 | 7201145a78314c97fb1cf882c87b3bd0d9e2359c5d5784f93ea7eb61c75d1358 |
| SHA512 | b2657d68ca2cd0c04d0e894947c7a1a8718e9d741a330b576fba4af6a3828fed9d741c0430ea3a6680742a01b50abc75746c271f5e03282474d7e2531dd2eb37 |
Analysis: behavioral1
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240903-en
Max time kernel
118s
Max time network
120s
Command Line
Signatures
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe
"C:\Users\Admin\AppData\Local\Temp\c35b3b6eaccc5e4912c1555080dc76cb_JaffaCakes118.exe"
Network
Files
\Users\Admin\AppData\Local\Temp\nsd9F4C.tmp\InstallOptions.dll
| MD5 | 714e0ecd29f9ec555f350f38672726c7 |
| SHA1 | 555b1492e782d7a30f280f2aecb64c642c1aaad3 |
| SHA256 | 21fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3 |
| SHA512 | ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312 |
C:\Users\Admin\AppData\Local\Temp\nsd9F4C.tmp\ioSpecial.ini
| MD5 | 9120e7281571f9b4f1830783ba0fb62d |
| SHA1 | bc7e1f51f8d9558f87fd3782e5c5f627a1557d4e |
| SHA256 | bf042b4fae95d026444826e4c245bbee36ec70f537686285e84eff03b4820c4b |
| SHA512 | 7eeab16ff9e83d4845e561d6640cea0ab89435cce5b64eb75dbf6f908c65512669e1e2f01d04c03c7162a091f86c74a22c1b23d6f25b27ec782297960dee5d3c |
\Users\Admin\AppData\Local\Temp\nsd9F4C.tmp\System.dll
| MD5 | 960a5c48e25cf2bca332e74e11d825c9 |
| SHA1 | da35c6816ace5daf4c6c1d57b93b09a82ecdc876 |
| SHA256 | 484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2 |
| SHA512 | cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da |
\Users\Admin\AppData\Local\Temp\nsd9F4C.tmp\StartMenu.dll
| MD5 | 28052e87fc73e2aad1db2db35eba62e7 |
| SHA1 | 72e4c599b45605e36aa5fe7b39caf1eba531328f |
| SHA256 | ca0b34b6d8ea4638f620f250539301164b6a300f679b96e22a0b1f03f5e56440 |
| SHA512 | 7759923e6c29a43dedee73ae0540d47b33a2861d6f3c0520deb90d068978494dbf01dde2974413699b2008306dbd753bdefdb5a78d4745d064ad6a5a3163fed2 |
Analysis: behavioral13
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240903-en
Max time kernel
142s
Max time network
127s
Command Line
Signatures
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\ThreadingModel = "Apartment" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ProgID | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ProgID\ = "Microsoft.PhotoAcqDeviceSelectionDlg.1" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\TypeLib | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Version | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B} | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ = "PhotoAcqDeviceSelectionDlg" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\VersionIndependentProgID\ = "Microsoft.PhotoAcqDeviceSelectionDlg" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\Version\ = "1.0" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\VersionIndependentProgID | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\ = "%ProgramFiles(x86)%\\Windows Photo Viewer\\PhotoAcq.dll" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\TypeLib\ = "{00f25ae8-3625-4e34-92d4-f0918cf010ee}" | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\CI3.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\CI3.exe
"C:\Users\Admin\AppData\Local\Temp\CI3.exe"
Network
Files
memory/1636-0-0x0000000002800000-0x0000000002A00000-memory.dmp
memory/1636-5-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-7-0x0000000002800000-0x0000000002A00000-memory.dmp
memory/1636-11-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-13-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-10-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-14-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-16-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-15-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-17-0x0000000002800000-0x0000000002A00000-memory.dmp
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | 37ea83fa6e0a1fa5621a6c2e953549df |
| SHA1 | 874b3e119a5b4a1d03d9968e47677971f12365e2 |
| SHA256 | 9e19236238816fc9f1f07b4de924a1487910720311eb714c4b67a41881aba735 |
| SHA512 | 93046260daf53c79e11eff5677fcee4ba33ea3f4f28209172829c7337ae5524b3678f40409fbdb0f6129060829d302ab665ba1ac7d3b26050f4c0ccde514a45f |
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | 7578973bd9ff088c211d5014b730a16c |
| SHA1 | d9ba76c07fdf1f6452ea86b3a748d65e4bccb21a |
| SHA256 | c7ec425954cffb9fa8bd71861b67eb051a662ce4d504a64683499c4f9d99874c |
| SHA512 | 0300874244c7defac70d09208daebdd0bf0c24eda6ce29e581a38d0caa0dc0a8006d06cd51f6e69b40d845672dc34bd5d4d30911a3e08daabc12ae0987963f06 |
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | 26be4faf384b28cd3c4f137ca1b3fba1 |
| SHA1 | c006bb214d16cd4fd041a71a9b4c8be0bce91ed1 |
| SHA256 | 10e140f4b5a1fcb3411ab1c30c91611c9a89e0bc41c5c1118e7dd666e3bba798 |
| SHA512 | cc5fb447c210632d4119fefc5e4fbbebe6327fa79fdbcb56e9f002b4410e8b2ece7432a7637690f046fdbf3653840f2d6c1545872bc8c0f532993cdbe5bece8d |
memory/1636-93-0x0000000002800000-0x0000000002A00000-memory.dmp
C:\ProgramData\InterAction studios\CI3\3.50iwn\CI3.cfg
| MD5 | 888ef788e9638027cdb6eeb0332067d8 |
| SHA1 | 41b6955f86dd527ab09ec481281e43247b9e52c6 |
| SHA256 | 0d2888b864984e6f414451f7fdeb3c287d4584e8b1cdf62d4ca823c283f65eca |
| SHA512 | 2b1d9b9c2e5831cd6d16dae7c4c8ea763984bb63d9573fe2bd71f9ad5d54e510be88a4de976d8890c26a8282c6af794a1b3e9bc0af0fedcd9f89d7e1e3c91371 |
memory/1636-115-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-118-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-117-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-116-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-120-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-119-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-122-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-121-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-124-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-123-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-126-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-125-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-128-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-127-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-130-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-129-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-132-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-131-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-134-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-133-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-136-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-135-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-138-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-137-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-140-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-139-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-142-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-141-0x0000000000400000-0x0000000000841000-memory.dmp
memory/1636-144-0x0000000010000000-0x0000000010040000-memory.dmp
memory/1636-143-0x0000000000400000-0x0000000000841000-memory.dmp
Analysis: behavioral18
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
149s
Max time network
152s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4544 wrote to memory of 2976 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
| PID 4544 wrote to memory of 2976 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
| PID 4544 wrote to memory of 2976 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 181.129.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 67.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 85.49.80.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
| MD5 | 09028d06b307f49555dffb76dc82c880 |
| SHA1 | 8f187451912fa4b5e0e3de3406d1d426e48f3fc1 |
| SHA256 | 0b0b36f894a702ac55405422733ccb22506c68e29848ae7eac9f0a4ce8cc597a |
| SHA512 | 505f537225eefd85f94c0807b7452c1df41c32f6d79203a2e9a5cc166385605176a68217808e505389e08fb8a61211728643ab4acea381e06dc23145c257c94f |
C:\Users\Admin\AppData\Local\Temp\nsmB249.tmp\System.dll
| MD5 | 960a5c48e25cf2bca332e74e11d825c9 |
| SHA1 | da35c6816ace5daf4c6c1d57b93b09a82ecdc876 |
| SHA256 | 484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2 |
| SHA512 | cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da |
C:\Users\Admin\AppData\Local\Temp\nsmB249.tmp\ioSpecial.ini
| MD5 | 67926734eff903b67d43388dccc7e268 |
| SHA1 | d9b43d1405ef4b032ca216219493fb2863e1a276 |
| SHA256 | f997199306e68a97c290fc8e60155428244d35bfb78f41b8da930806aa0ff04a |
| SHA512 | c0b11dd4c5dd9e83e50aebdd7f32a6c1f41e47ee5a377909158361b785cf59a5095f1ffb044c8af6f37caa35f80a51dad0ccd86ae4e3a27c8fe6f2d7d2809efe |
C:\Users\Admin\AppData\Local\Temp\nsmB249.tmp\InstallOptions.dll
| MD5 | 714e0ecd29f9ec555f350f38672726c7 |
| SHA1 | 555b1492e782d7a30f280f2aecb64c642c1aaad3 |
| SHA256 | 21fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3 |
| SHA512 | ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312 |
C:\Users\Admin\AppData\Local\Temp\nsmB249.tmp\ioSpecial.ini
| MD5 | c501b5ed299349043148ce84b52c7a25 |
| SHA1 | 64bcfa7b2c1faa7756be1b77386f9b81d965edb2 |
| SHA256 | 7310fd05881df537d5968b5909e17fa2d6afe005561a2b40f10edd39e75c0b61 |
| SHA512 | 2b3b5e6422fb836198fddf9b6cb2fdd2808eeb6a471beebe43d8b8f28eea7debaba5d6b66fb96305a28df1ad0dfd2ceaa01b324e9f6cb5ce520f23d02aee6f3e |
Analysis: behavioral20
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
135s
Max time network
141s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4656 wrote to memory of 4284 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4656 wrote to memory of 4284 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4656 wrote to memory of 4284 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4284 -ip 4284
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4284 -s 636
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 14.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 56.163.245.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.173.189.20.in-addr.arpa | udp |
Files
Analysis: behavioral26
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
145s
Max time network
148s
Command Line
Signatures
Browser Information Discovery
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
| N/A | N/A | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | N/A |
Suspicious use of FindShellTrayWindow
Suspicious use of SendNotifyMessage
Suspicious use of WriteProcessMemory
Processes
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument C:\Users\Admin\AppData\Local\Temp\readme.htm
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xfc,0xd8,0x7ff97a2c46f8,0x7ff97a2c4708,0x7ff97a2c4718
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2032 /prefetch:2
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2344 /prefetch:3
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2812 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3296 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3328 /prefetch:1
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Windows\System32\CompPkgSrv.exe
C:\Windows\System32\CompPkgSrv.exe -Embedding
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4960 /prefetch:8
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5508 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5164 /prefetch:1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1984,12983510095484659427,6474681805189874234,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:2
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 88.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 24.242.123.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 17.160.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| N/A | 224.0.0.251:5353 | udp | |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.86.106.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 85.49.80.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 11.227.111.52.in-addr.arpa | udp |
Files
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | e443ee4336fcf13c698b8ab5f3c173d0 |
| SHA1 | 9bf70b16f03820cbe3158e1f1396b07b8ac9d75a |
| SHA256 | 79e277da2074f9467e0518f0f26ca2ba74914bee82553f935a0ccf64a0119e8b |
| SHA512 | cbf6f6aa0ea69b47f51592296da2b7be1180e7b483c61b4d17ba9ee1a2d3345cbe0987b96f4e25de1438b553db358f330aad8a26e8522601f055c3d5a8313cdd |
\??\pipe\LOCAL\crashpad_4452_LNDDRVLTRRPEMCGZ
| MD5 | d41d8cd98f00b204e9800998ecf8427e |
| SHA1 | da39a3ee5e6b4b0d3255bfef95601890afd80709 |
| SHA256 | e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855 |
| SHA512 | cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat
| MD5 | 56a4f78e21616a6e19da57228569489b |
| SHA1 | 21bfabbfc294d5f2aa1da825c5590d760483bc76 |
| SHA256 | d036661e765ee8fd18978a2b5501e8df6b220e4bca531d9860407555294c96fb |
| SHA512 | c2c3cd1152bb486028fe75ab3ce0d0bc9d64c4ca7eb8860ddd934b2f6e0140d2c913af4fa082b88e92a6a6d20fd483a1cb9813209f371a0f56374bc97d7f863b |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 6d29c2b78f0e08a5aee93877f6703a3f |
| SHA1 | 426a1bb01cbe54a76b4e3fd26858156bceade212 |
| SHA256 | 86886e28eea50ef5e8c72592c8e4a5c07b5f49cd22775bc8b0de35142fc20a30 |
| SHA512 | b2fb02ae32c9483be07672d5f1d246a3b2a51d27a9d749739f51ebf764c65bc9099d2fe62245725acc9d7bbfe1f4683dcf2972fbdcd9c3db21e0dc846f1569ba |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\data_reduction_proxy_leveldb\CURRENT
| MD5 | 6752a1d65b201c13b62ea44016eb221f |
| SHA1 | 58ecf154d01a62233ed7fb494ace3c3d4ffce08b |
| SHA256 | 0861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd |
| SHA512 | 9cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389 |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Local State
| MD5 | a9f9f26925a5b94ce9c0048f0e0fa000 |
| SHA1 | 7a906576d405110632a24ba7e9bb3acc4b1e4f7a |
| SHA256 | b94b092dec4aaf36b5cdd67836bf0c1b0ca7886745c005b745e9a35a4ac293d7 |
| SHA512 | f03b0c644bbee9c50872f17f1b159f85618a5f90f69508ad5cc11928e5760329362b7b2fcd3dfc93008e62d8e30abc3586a71c5653e99e6793783a166087684f |
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences
| MD5 | 0ca1a03da04a03d3e55291031b017b98 |
| SHA1 | 7e6e745c8427bc33143a5cc27f070785c3e9ed26 |
| SHA256 | 69c95e9b6dd012dda77bdc02b377fbd10c8e41949459121c5f96c414ddd20e47 |
| SHA512 | 21d038f4e28eeffc8c4cbe4763da329dfeac9faf32cbcd330eb3078947667c5c3422cb92fe4163890f3bf39785e4db43b0b129ba0859af998c3716b9429f1596 |
Analysis: behavioral4
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
92s
Max time network
136s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 4924 wrote to memory of 3604 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4924 wrote to memory of 3604 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 4924 wrote to memory of 3604 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Dialer.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Dialer.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 3604 -ip 3604
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3604 -s 608
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 197.87.175.4.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 107.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.210.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 13.227.111.52.in-addr.arpa | udp |
Files
Analysis: behavioral16
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
91s
Max time network
94s
Command Line
Signatures
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B} | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\ = "Microsoft Feeds Request" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InProcServer32 | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InProcServer32\ = "C:\\Windows\\SysWOW64\\msfeeds.dll" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InProcServer32\ThreadingModel = "Apartment" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\GLWorker.exe
"C:\Users\Admin\AppData\Local\Temp\GLWorker.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 69.31.126.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 20.49.80.91.in-addr.arpa | udp |
Files
memory/4872-0-0x0000000000400000-0x000000000060C000-memory.dmp
memory/4872-3-0x0000000002930000-0x0000000002B30000-memory.dmp
memory/4872-8-0x0000000002930000-0x0000000002B30000-memory.dmp
memory/4872-10-0x0000000002930000-0x0000000002B30000-memory.dmp
memory/4872-11-0x0000000002930000-0x0000000002B30000-memory.dmp
memory/4872-14-0x0000000000400000-0x000000000060C000-memory.dmp
memory/4872-16-0x0000000002930000-0x0000000002B30000-memory.dmp
memory/4872-15-0x0000000000400000-0x000000000060C000-memory.dmp
memory/4872-17-0x0000000002930000-0x0000000002B30000-memory.dmp
memory/4872-19-0x0000000000400000-0x000000000060C000-memory.dmp
memory/4872-13-0x0000000000400000-0x000000000060C000-memory.dmp
Analysis: behavioral8
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1144 wrote to memory of 4640 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1144 wrote to memory of 4640 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 1144 wrote to memory of 4640 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\StartMenu.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4640 -ip 4640
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4640 -s 612
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 58.55.71.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 149.220.183.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 53.210.109.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 18.31.95.13.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 182.129.81.91.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 83.210.23.2.in-addr.arpa | udp |
| N/A | 20.189.173.8:443 | tcp |
Files
Analysis: behavioral24
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win10v2004-20241007-en
Max time kernel
93s
Max time network
149s
Command Line
Signatures
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2332 wrote to memory of 4512 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2332 wrote to memory of 4512 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
| PID 2332 wrote to memory of 4512 | N/A | C:\Windows\system32\rundll32.exe | C:\Windows\SysWOW64\rundll32.exe |
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\bass.dll,#1
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 8.8.8.8.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 228.249.119.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 97.17.167.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 15.164.165.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 92.12.20.2.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 48.229.111.52.in-addr.arpa | udp |
Files
memory/4512-0-0x0000000010000000-0x0000000010040000-memory.dmp
Analysis: behavioral3
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20241010-en
Max time kernel
119s
Max time network
121s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Dialer.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\Dialer.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 228
Network
Files
Analysis: behavioral15
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20241010-en
Max time kernel
119s
Max time network
121s
Command Line
Signatures
Banload
Banload family
Identifies VirtualBox via ACPI registry values (likely anti-VM)
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Checks BIOS information in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\14.0.0.0 | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\14.0.0.0\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\Class = "Microsoft.Office.Interop.Access.AllModulesClass" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32 | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\Assembly = "Microsoft.Office.Interop.Access, Version=14.0.0.0, Culture=neutral, PublicKeyToken=71E9BCE111E9429C" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\RuntimeVersion = "v2.0.50727" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Access.AllModulesClass" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B}\InprocServer32\14.0.0.0\RuntimeVersion = "v2.0.50727" | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E0E3262E-C9DE-13D1-BC03-0E8FF93EAE2B} | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: 33 | N/A | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
| Token: SeIncBasePriorityPrivilege | N/A | C:\Users\Admin\AppData\Local\Temp\GLWorker.exe | N/A |
Processes
C:\Users\Admin\AppData\Local\Temp\GLWorker.exe
"C:\Users\Admin\AppData\Local\Temp\GLWorker.exe"
Network
Files
memory/2256-7-0x0000000000400000-0x000000000060C000-memory.dmp
memory/2256-0-0x00000000025C0000-0x00000000027C0000-memory.dmp
memory/2256-6-0x00000000025C0000-0x00000000027C0000-memory.dmp
memory/2256-10-0x0000000000400000-0x000000000060C000-memory.dmp
memory/2256-14-0x00000000025C0000-0x00000000027C0000-memory.dmp
memory/2256-16-0x0000000000400000-0x000000000060C000-memory.dmp
memory/2256-12-0x0000000000400000-0x000000000060C000-memory.dmp
memory/2256-11-0x0000000000400000-0x000000000060C000-memory.dmp
memory/2256-13-0x00000000025C0000-0x00000000027C0000-memory.dmp
Analysis: behavioral17
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20240903-en
Max time kernel
117s
Max time network
119s
Command Line
Signatures
Deletes itself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
Enumerates physical storage devices
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe | N/A |
NSIS installer
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2700 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
| PID 2700 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
| PID 2700 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
| PID 2700 wrote to memory of 2768 | N/A | C:\Users\Admin\AppData\Local\Temp\Uninstall.exe | C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\Uninstall.exe
"C:\Users\Admin\AppData\Local\Temp\Uninstall.exe"
C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
"C:\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=C:\Users\Admin\AppData\Local\Temp\
Network
Files
\Users\Admin\AppData\Local\Temp\~nsu.tmp\Au_.exe
| MD5 | 09028d06b307f49555dffb76dc82c880 |
| SHA1 | 8f187451912fa4b5e0e3de3406d1d426e48f3fc1 |
| SHA256 | 0b0b36f894a702ac55405422733ccb22506c68e29848ae7eac9f0a4ce8cc597a |
| SHA512 | 505f537225eefd85f94c0807b7452c1df41c32f6d79203a2e9a5cc166385605176a68217808e505389e08fb8a61211728643ab4acea381e06dc23145c257c94f |
\Users\Admin\AppData\Local\Temp\nstE44.tmp\System.dll
| MD5 | 960a5c48e25cf2bca332e74e11d825c9 |
| SHA1 | da35c6816ace5daf4c6c1d57b93b09a82ecdc876 |
| SHA256 | 484f8e9f194ed9016274ef3672b2c52ed5f574fb71d3884edf3c222b758a75a2 |
| SHA512 | cc450179e2d0d56aee2ccf8163d3882978c4e9c1aa3d3a95875fe9ba9831e07ddfd377111dc67f801fa53b6f468a418f086f1de7c71e0a5b634e1ae2a67cd3da |
C:\Users\Admin\AppData\Local\Temp\nstE44.tmp\ioSpecial.ini
| MD5 | 922fa381169872ba4b9e706eb56b7e3b |
| SHA1 | 05d08fd35fc554e4c25f29bc795b2fe1c3bd9c72 |
| SHA256 | 582c551cab3e6e14866bb8f1ba2f28769d162efbf057041143d7657f2ec31db2 |
| SHA512 | e249766395453ba325224cc025dfdc4c591f87e9bec91bf28caf33c9db89ebe252bd4652a1907ad92ef0065cc78963bbabc8d00e3fe88d63cbfe301228221568 |
C:\Users\Admin\AppData\Local\Temp\nstE44.tmp\ioSpecial.ini
| MD5 | 01a9a4cb357bfe6e9d9366fe0fcb2601 |
| SHA1 | d6968d9f7299b571d71165680443fb2312217a57 |
| SHA256 | 0972d6a03cc221816d09cde49c1a9cc476d5f2add69e028507b8f4f1366154e1 |
| SHA512 | f1569ca0d429377e542c8a3c534e47cbfced7d632de61bd5e031cad0d898b5b9a3a9332ac5aa25a16bd9ce0c8e82a59aab7bf26c8d21f86164bcf596fa26f0f1 |
\Users\Admin\AppData\Local\Temp\nstE44.tmp\InstallOptions.dll
| MD5 | 714e0ecd29f9ec555f350f38672726c7 |
| SHA1 | 555b1492e782d7a30f280f2aecb64c642c1aaad3 |
| SHA256 | 21fea4cf18de8e25d0ffa3375699150fcd04e6d470358696f2dffdd3fc09d7f3 |
| SHA512 | ced5814f25b688d1ede5a1395bcca69e1a0cba260104f156dc03de6ebb2015f6d832fed86ac234c36a10a75be33f489a63c8bd6111e3aaf4b078af1d94b00312 |
C:\Users\Admin\AppData\Local\Temp\nstE44.tmp\ioSpecial.ini
| MD5 | c501b5ed299349043148ce84b52c7a25 |
| SHA1 | 64bcfa7b2c1faa7756be1b77386f9b81d965edb2 |
| SHA256 | 7310fd05881df537d5968b5909e17fa2d6afe005561a2b40f10edd39e75c0b61 |
| SHA512 | 2b3b5e6422fb836198fddf9b6cb2fdd2808eeb6a471beebe43d8b8f28eea7debaba5d6b66fb96305a28df1ad0dfd2ceaa01b324e9f6cb5ce520f23d02aee6f3e |
Analysis: behavioral19
Detonation Overview
Submitted
2024-12-04 16:17
Reported
2024-12-04 16:20
Platform
win7-20241023-en
Max time kernel
119s
Max time network
120s
Command Line
Signatures
Program crash
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\SysWOW64\WerFault.exe | C:\Windows\SysWOW64\rundll32.exe |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\SysWOW64\rundll32.exe | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\system32\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\InstallOptions.dll,#1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 244