Overview
overview
7Static
static
3XMouse_But....5.exe
windows11-21h2-x64
7$PLUGINSDI...md.dll
windows11-21h2-x64
3$PLUGINSDI...ns.dll
windows11-21h2-x64
3$PLUGINSDI...er.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3$PLUGINSDI...gs.dll
windows11-21h2-x64
3BugTrapU-x64.dll
windows11-21h2-x64
1XMouseButt...ol.exe
windows11-21h2-x64
1XMouseButtonHook.dll
windows11-21h2-x64
1uninstaller.exe
windows11-21h2-x64
7$PLUGINSDI...md.dll
windows11-21h2-x64
3$PLUGINSDI...em.dll
windows11-21h2-x64
3Analysis
-
max time kernel
46s -
max time network
48s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
23-12-2024 21:31
Static task
static1
Behavioral task
behavioral1
Sample
XMouse_Button_Control_V2.20.5.exe
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ShellExecAsUser.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win11-20241007-en
Behavioral task
behavioral7
Sample
BugTrapU-x64.dll
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
XMouseButtonControl.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
XMouseButtonHook.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
uninstaller.exe
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/ExecCmd.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win11-20241007-en
General
-
Target
XMouse_Button_Control_V2.20.5.exe
-
Size
2.9MB
-
MD5
2e9725bc1d71ad1b8006dfc5a2510f88
-
SHA1
6e1f7d12881696944bf5e030a7d131b969de0c6c
-
SHA256
2240bf5fb5d80938b0676c46ef9f84bc1739c32f60c473ff85e530ae0eca2818
-
SHA512
62bd9cde806f83f911f1068b452084ef2adc01bc0dec2d0f668a781cc0d94e39f6e35618264d8796ca205724725abd40429f463017e6ca5caf7d683429f82d39
-
SSDEEP
49152:n65SJw48kZN+nCYk7c44+Y0hdwn4Km2A5aT/pVE0hYYajihV2Qso0SWMrboF:tfpeno4oY0QZm2dlNJsrHM4
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5028 XMouseButtonControl.exe 2832 XMouseButtonControl.exe -
Loads dropped DLL 12 IoCs
pid Process 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 4304 XMouse_Button_Control_V2.20.5.exe 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe 2832 XMouseButtonControl.exe 2832 XMouseButtonControl.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XMouseButtonControl = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe /notportable /delay" XMouse_Button_Control_V2.20.5.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 8 IoCs
description ioc Process File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonHook.dll XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\BugTrapU-x64.dll XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\License.txt XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\ChangeLog.txt XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\X-Mouse Button Control User Guide.pdf XMouse_Button_Control_V2.20.5.exe File opened for modification C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\changelog.txt XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\uninstaller.exe XMouse_Button_Control_V2.20.5.exe File created C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe XMouse_Button_Control_V2.20.5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XMouse_Button_Control_V2.20.5.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Control Panel\Desktop XMouse_Button_Control_V2.20.5.exe Set value (int) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Control Panel\Desktop\LowLevelHooksTimeout = "1000" XMouse_Button_Control_V2.20.5.exe -
Modifies registry class 38 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbclp XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\ = "open" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\DefaultIcon XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /install:\"%1\"" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /profile:\"%1\"" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\DefaultIcon XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open\command XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcs\ = "X-Mouse Button Control Application or Window Profile" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\ = "X-Mouse Button Control Settings" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbclp\ = "X-Mouse Button Control Language Pack" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\ = "open" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\ = "X-Mouse Button Control Language Pack" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\shell\open XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcp XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcp\ = "X-Mouse Button Control Settings" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open\command XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\shell\open XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Language Pack\DefaultIcon\ = "C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe,0" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\ = "X-Mouse Button Control Application or Window Profile" XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open\command\ = "\"C:\\Program Files\\Highresolution Enterprises\\X-Mouse Button Control\\XMouseButtonControl.exe\" /import:\"%1\"" XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\open\command XMouse_Button_Control_V2.20.5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Settings\DefaultIcon XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.xmbcs XMouse_Button_Control_V2.20.5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\X-Mouse Button Control Application or Window Profile\shell\ = "open" XMouse_Button_Control_V2.20.5.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2CCA77834D89F34DC9A6B30AB7D0341CFDB6B119 XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2CCA77834D89F34DC9A6B30AB7D0341CFDB6B119\Blob = 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 XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\2CCA77834D89F34DC9A6B30AB7D0341CFDB6B119\Blob = 190000000100000010000000ed531aeb5162cdf89b9262f82248b370140000000100000014000000dcc6cc296fab043b1f10c77e7d990a3eaae493e60300000001000000140000002cca77834d89f34dc9a6b30ab7d0341cfdb6b1190f0000000100000020000000df00824c9538ca1e7bf03f9a5b0ce2f41fc0845667ce8fd100b9127d74885f1e2000000001000000f9020000308202f5308201dda00302010202103ee7ed016c184a202700ba06286c876c300d06092a864886f70d01010b050030133111300f06035504031308436c6f75644e6574301e170d3234313132383231303030305a170d3239313132383231303030305a30133111300f06035504031308436c6f75644e657430820122300d06092a864886f70d01010105000382010f003082010a0282010100a83d0085b2b7e9ecfb6b9c063a93a73be1a912946dc261955729ce3e698bb53e2d512bf39a4a0da71a14857d4b9498e981f38b089629462a49a4e783aff40d819cf48d38358aea5daa8b00b90683f749aaf6d0980497c51969daaaf3d8ad1992f1aba8bba74b487ed1427bf3a694f58bd16a8d09b294b9d6cd799909fa5fef34d28b8953b56c605a7511d7df47600cab2088647b33ba4a5c7298697381a191fd46bc565b1526b349eb52105443ca0d977646de7f111387fe6193a4874d7e57f815609f100746c2642ada094a3527a654061de1b1d8006ab9c6cb5bf7b14431e63634c791f00458f9f0902c60d487340b175d19b1d1436eec35b7232ba3f49c8b0203010001a3453043300e0603551d0f0101ff04040302010630120603551d130101ff040830060101ff020101301d0603551d0e04160414dcc6cc296fab043b1f10c77e7d990a3eaae493e6300d06092a864886f70d01010b05000382010100119432d62c9e539153c0680c0235b79033cdd66a0dbb882b47c532f58702501a0534e89fcb1fba364e728b4b62e5695ca07a68d8fb35142ac7326d2fd8b2fefded795f97e676dcc22a1f16e75341abd81d78bae14f3454a10e02f7c2c89799d9684c05fe82adddafad8d41b95d3c282bc9b3a61382e24f9b3baa0a9cb5f21076963c7fd506fefbd482da739ff47ff1fb07cf09d24deba584d1a21a9f1e4e0ea8cebbc56ebbd55298c5b67c7945ab792cd22db72b34e7e319de4d5c33e192e4baca57af937a699a370a2c637e3628eebcc832cf888bae731087a8dab69e0b70fae4c185aa503673e16ba2e9c93b3d01de927891ef27ee66b040ba0c8a25f418cd XMouseButtonControl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 040000000100000010000000d5e98140c51869fc462c8975620faa780f0000000100000014000000a8569ccd21ef9cc5737c7a12df608c2cbc545df153000000010000006500000030633021060b2a84680186f6770205010130123010060a2b0601040182373c0101030200c03021060b2a84680186f6770205010730123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b060105050703080b0000000100000034000000430065007200740075006d002000540072007500730074006500640020004e006500740077006f0072006b0020004300410000006200000001000000200000005c58468d55f58e497e743982d2b50010b6d165374acf83a7d4a32db768c4408e1400000001000000140000000876cdcb07ff24f6c5cdedbb90bce284374675f71d0000000100000010000000e3f9af952c6df2aaa41706a77a44c20303000000010000001400000007e032e020b72c3f192f0628a2593a19a70f069e1900000001000000100000001f7e750b566b128ac0b8d6576d2a70a52000000001000000bf030000308203bb308202a3a00302010202030444c0300d06092a864886f70d0101050500307e310b300906035504061302504c31223020060355040a1319556e697a65746f20546563686e6f6c6f6769657320532e412e31273025060355040b131e43657274756d2043657274696669636174696f6e20417574686f72697479312230200603550403131943657274756d2054727573746564204e6574776f726b204341301e170d3038313032323132303733375a170d3239313233313132303733375a307e310b300906035504061302504c31223020060355040a1319556e697a65746f20546563686e6f6c6f6769657320532e412e31273025060355040b131e43657274756d2043657274696669636174696f6e20417574686f72697479312230200603550403131943657274756d2054727573746564204e6574776f726b20434130820122300d06092a864886f70d01010105000382010f003082010a0282010100e3fb7da372bac2f0c91487f56b014ee16e4007ba6d275d7ff75b2db35ac7515faba432a66187b66e0f86d2300297f8d76957a118395d6a6479c60159ac3c314a387cd204d24b28e8205f3b07a2cc4d73dbf3ae4fc756d55aa79689faf3ab68d423865927cf0927bcac6e72831c3072dfe0a2e9d2e1747519bd2a9e7b1554041bd74339ad5528c5e21abbf4c0e4ae384933cc76859f3945d2a49ef2128c51f87ce42d7ff5ac5feb169fb12dd1bacc9142774c25c990386fdbf0ccfb8e1e97593ed5604ee60528ed4979134bba48db2ff972d339cafe1fd83472f5b440cf3101c3ecde112d175d1fb850d15e19a769de073328ca5095f9a754cb54865045a9f9490203010001a3423040300f0603551d130101ff040530030101ff301d0603551d0e041604140876cdcb07ff24f6c5cdedbb90bce284374675f7300e0603551d0f0101ff040403020106300d06092a864886f70d01010505000382010100a6a8ad22ce013da6a3ff62d0489d8b5e72b07844e3dc1caf09fd2348fabd2ac4b95504b510a38d27de0b8263d0eede0c3779415b22b2b09a415ca670e0d4d077cb23d300e06c562fe1690d0dd9aabf218150d906a5a8ff9537d0aafee2b3f5992d45848ae54209d774022ff789d899e9bc27d4478dba0d461c77cf14a41cb9a431c49c28740334ff331926a5e90d74b73e97c676e82796a366dde1aef2415bca9856837370e4861ad23141ba2fbe2d135a766f4ee84e810e3f5b0322a012be6658114acb03c4b42a2a2d9617e03954bc48d376279d9a2d06a6c9ec39d2abdb9f9a0b27023529b14095e7f9e89c55881946d6b734f57ece399ad938f151f74f2c XMouseButtonControl.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\07E032E020B72C3F192F0628A2593A19A70F069E\Blob = 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 XMouseButtonControl.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1192 msedge.exe 1192 msedge.exe 2172 msedge.exe 2172 msedge.exe 1364 msedge.exe 1364 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 5028 XMouseButtonControl.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe -
Suspicious use of FindShellTrayWindow 29 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 5028 XMouseButtonControl.exe 2172 msedge.exe 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 2172 msedge.exe 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe 5028 XMouseButtonControl.exe 2520 MiniSearchHost.exe 2832 XMouseButtonControl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 4796 2172 msedge.exe 81 PID 2172 wrote to memory of 4796 2172 msedge.exe 81 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1688 2172 msedge.exe 82 PID 2172 wrote to memory of 1192 2172 msedge.exe 83 PID 2172 wrote to memory of 1192 2172 msedge.exe 83 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84 PID 2172 wrote to memory of 2528 2172 msedge.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\XMouse_Button_Control_V2.20.5.exe"C:\Users\Admin\AppData\Local\Temp\XMouse_Button_Control_V2.20.5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies registry class
PID:4304
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://www.highrez.co.uk/scripts/postinstall.asp?package=XMouse&major=2&minor=20&build=5&revision=0&platform=x641⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x108,0x10c,0x110,0xe4,0x114,0x7ffbea103cb8,0x7ffbea103cc8,0x7ffbea103cd82⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1916 /prefetch:22⤵PID:1688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2288 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2780 /prefetch:82⤵PID:2528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3264 /prefetch:12⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:12⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1908,10728172122015563448,11404808868812387164,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3908 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe"C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /Installed /notportable1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system certificate store
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5028
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1764
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5048
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2520
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:1568
-
C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe"C:\Program Files\Highresolution Enterprises\X-Mouse Button Control\XMouseButtonControl.exe" /notportable1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2832
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD580d5f32b3fc515402b9e1fe958dedf81
SHA1a80ffd7907e0de2ee4e13c592b888fe00551b7e0
SHA2560ab8481b44e7d2f0d57b444689aef75b61024487a5cf188c2fc6b8de919b040a
SHA5121589246cd480326ca22c2acb1129a3a90edf13b75031343061f0f4ed51580dfb890862162a65957be9026381bb24475fec6ddcb86692c5961a24b18461e5f1f0
-
Filesize
1.7MB
MD5bb632bc4c4414303c783a0153f6609f7
SHA1eb16bf0d8ce0af4d72dff415741fd0d7aac3020e
SHA2567cc348f8d2ee10264e136425059205cf2c17493b4f3f6a43af024aecb926d8c8
SHA51215b34efe93d53e54c1527705292fbf145d6757f10dd87bc787dc40bf02f0d641468b95c571f7037417f2f626de2afcd68b5d82214e27e9e622ab0475633e9de5
-
Filesize
1.0MB
MD5d62a4279ebba19c9bf0037d4f7cbf0bc
SHA15257d9505cca6b75fe55dfdaf2ea83a7d2d28170
SHA256c845e808dc035329a7c95c846413a7afb9976f09872ba3c05dfa5f492156eef0
SHA5126895a12cddc41bf516279b1235fca238b0b3b0cef2cc25abe14a9160ed23f5bde3d476f885d674537febc7de7eb58b0824d96153c626e1563a5a8a1887fb5323
-
Filesize
152B
MD502a4b762e84a74f9ee8a7d8ddd34fedb
SHA14a870e3bd7fd56235062789d780610f95e3b8785
SHA256366e497233268d7cdf699242e4b2c7ecc1999d0a84e12744f5af2b638e9d86da
SHA51219028c45f2e05a0cb32865a2554513c1536bf9da63512ff4e964c94a3e171f373493c7787d2d2a6df8012648bbefab63a9de924f119c50c39c727cf81bdc659f
-
Filesize
152B
MD5826c7cac03e3ae47bfe2a7e50281605e
SHA1100fbea3e078edec43db48c3312fbbf83f11fca0
SHA256239b1d7cc6f76e1d1832b0587664f114f38a21539cb8548e25626ed5053ea2ab
SHA512a82f3c817a6460fd8907a4ac6ab37c2129fb5466707edcfb565c255680d7f7212a5669fe2a42976150f16e4e549ea8310078f22ed35514ee1b7b45b46d8cc96e
-
Filesize
5KB
MD5cac43a292153d9b2ffa36f63b08215eb
SHA16f9225887cd025928edf17c8da94565a15fddb98
SHA2560e9afe6c3fe08328fa34cf4359fecdb290b6bf2e189357ec95db5b87370abbf1
SHA5129715200999dd1399163c1f7b88a33165a137bd77716762825dbba098d92f031145a4f4a2378d2beb9380eec631e5c6722165561c430ef84217e56c0cdc16dec2
-
Filesize
5KB
MD5202a5447382023ed28d016c7a2a59f0c
SHA156ed06f0a8816d3a0960f5373926d159cf68d14e
SHA256884ba73a4f712c717d41a5cad1f12692654a322ba5dd4a44ce2fb4a1b7a67350
SHA512865ddd3c06ed552eaae1fee2bb54decc87aa82bf4f0b43ed20f97aac20f553c9f74d427c484a04bfae6d98bad551545c7c3c3ea00bb0f95872af23e277aae1da
-
Filesize
10KB
MD57a5bab52ce81569b995f013684ed2e64
SHA1568beae29f9f2b3f96b05a1a1b2b46a053d21704
SHA256030bfd1820efd484accb3dbaf6fdf4e38c7d2ec336d1bc4c7679a1bfa5e5d3ac
SHA512afe966a6c0ec419ea3c7951c5ee4dd64d30e12203b58bcc0bc722501a9b334f5544de9214c3324219210dbc329d00de9be6ca8efa4bc36adfaae2215a3d39c5a
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\9311b31e-8c7d-44aa-8b16-cc2e4ea98e7f.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5f47534c9afba84dec2f28aa7ac827a6f
SHA1b80ab610ad2ba187fbc1cd9a811cd3fee554694f
SHA256d947c9cdbee0f04953eb02ff0eb39b9158d06b70bf096b1f6b3b62b36cb981ef
SHA512074f9d052a69e8d424abb245b84be7271597ad58bba9994f6f0c2906045260158aed32b7c6776ffd079cfb474d9f5593116ff081f9643399cdb16aee1ca05385
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize11KB
MD5feae31d21ce38e8cd0816a87d228485a
SHA1c5ce70aa98ddc20e5808dfb07e3835b51c35372e
SHA2569275edeeaab9b0d4a904946c3a5e36f2526a0b5c8e7755ce658f03050df5e5da
SHA51213503718a837b903e89ed6a31f7d9b7906e43c74ae3fb6389acb059ee84d080a3af47718c0a95f1468f4f212121e73ed9033470c5b59fb9d1f1fd14e5b95e5d0
-
Filesize
14KB
MD5d753362649aecd60ff434adf171a4e7f
SHA13b752ad064e06e21822c8958ae22e9a6bb8cf3d0
SHA2568f24c6cf0b06d18f3c07e7bfca4e92afce71834663746cfaa9ddf52a25d5c586
SHA51241bf41add275867553fa3bd8835cd7e2a2a362a2d5670ccbfad23700448bad9fe0f577fb6ee9d4eb81dfc10d463b325b8a873fe5912eb580936d4ad96587aa6d
-
Filesize
7KB
MD586a81b9ab7de83aa01024593a03d1872
SHA18fd7c645e6e2cb1f1bcb97b3b5f85ce1660b66be
SHA25627d61cacd2995f498ba971b3b2c53330bc0e9900c9d23e57b2927aadfdee8115
SHA512cc37bd5d74d185077bdf6c4a974fb29922e3177e2c5971c664f46c057aad1236e6f3f856c5d82f1d677c29896f0e3e71283ef04f886db58abae151cb27c827ac
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3
-
Filesize
696B
MD5239f1ab2554e44180dac3aaafb24c5aa
SHA1dbe0a88415c66acc2b77c2c81024390b89199451
SHA256822adb67f6aefff7453565f9b64fb9fc56b231641fbafbc8a8100d45b79b70b1
SHA51240add84b974dc6bcb0f50dc1b9245d9911beb6d1697fe280112cad03f1b4e46f7d9f4364902c781a0a96df0de82b85faad49343883a05f2a7b519af564a397b8
-
Filesize
709B
MD54f0fa35c98090f450333cb17227bf095
SHA13a1775695dd246131c4af04c6cba6e5f70fadf5e
SHA2566260eca86978b6df23f4eb1d9569acfbaeabbda419dbf90580fd88956f7a5cde
SHA5129c4d8996be1ad0cebb3dbd79f4cc20f0a6db68d11c6150bcd8e10715e39f44947c2ec2062b63929cb2e0a510f57d1701e76801efd356933d060e9e6814598dd7
-
Filesize
765B
MD5f059b79c428f408b5e4fd3e9e7d8ebb5
SHA14dd43b9e64084b492f20a5e7566223a22c08a3ac
SHA256e8dd4339247d38f186262fa949635197eccf82319661d1483a4992f814690c2c
SHA512ed684d5fe1d468b18d58d0c0ba48f078c013d6195df6de8b189a985c48553f073290626b4a19b4f0b49a93dac1d4df62d913fe8f71866d586a483585d799ca0e
-
Filesize
765B
MD5955ee14c5c2f19d6be22a01265eae88b
SHA10ac6702e4bed4b97610763230fc41ad831216e69
SHA2567dc57667ad58e8aab13cad4c1f99bf0e25a5c8061d6bb1e8f9c1da3bfa25d6ab
SHA51272366abc1ff6ec1beda6242f6170625a12f0ac3f2b58cb266a4eff1608c642f14bfa5724044cd4e88b98714ad0b11284d427f7bd9c2f8210638546091b520f99
-
Filesize
9KB
MD5f832e4279c8ff9029b94027803e10e1b
SHA1134ff09f9c70999da35e73f57b70522dc817e681
SHA2564cd17f660560934a001fc8e6fdcea50383b78ca129fb236623a9666fcbd13061
SHA512bf92b61aa267e3935f0ea7f47d8d96f09f016e648c2a7e7dcd5ecc47da864e824c592098c1e39526b643bd126c5c99d68a7040411a4cf68857df629f24d4107d
-
C:\Users\Admin\AppData\Roaming\Highresolution Enterprises\XMouseButtonControl\XMouseButtonControl.log
Filesize1KB
MD58e5894da0df54c2bbe65c9898fcffa94
SHA1f81bf98deb527d048f7c2ce550f82817b9ed33dd
SHA25681e0ebd7d919e8aa7b992493772b201212a4080b9fd3e763b8a6c16aef919dd2
SHA5124a709ea20a7c15a5afdd5a73e3802ac8ed9a11e9a17863622e86caf5741e642ab039e20935d513aa39aec09ffbcd3d3b11da2df340a5c525a5ac404232690a7b