Resubmissions
26/02/2025, 17:13
250226-vrvmrsxky4 10Analysis
-
max time kernel
80s -
max time network
84s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
26/02/2025, 17:13
Static task
static1
General
-
Target
-
Size
1.4MB
-
MD5
63210f8f1dde6c40a7f3643ccf0ff313
-
SHA1
57edd72391d710d71bead504d44389d0462ccec9
-
SHA256
2aab13d49b60001de3aa47fb8f7251a973faa7f3c53a3840cdf5fd0b26e9a09f
-
SHA512
87a89e8ab85be150a783a9f8d41797cfa12f86fdccb48f2180c0498bfd2b1040b730dee4665fe2c83b98d436453680226051b7f1532e1c0e0cda0cf702e80a11
-
SSDEEP
12288:WZgSKWk54jeg6lL5assQHtzV2KoLJ+PwXxwuLSJ8slf1zMr6iL/KNDx2PIXe2Q:KgoLetlLS8tz6V+PwD0XVMrXCNDxtK
Malware Config
Signatures
-
Troldesh family
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\lnkfile\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" [email protected] -
resource yara_rule behavioral2/memory/2104-1-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-2-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-4-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-3-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-5-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-9-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-10-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-11-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-12-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-28-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-29-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-32-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-85-0x0000000000400000-0x00000000005DE000-memory.dmp upx behavioral2/memory/2104-99-0x0000000000400000-0x00000000005DE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OneDrive.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 OneDrive.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz OneDrive.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\OneDrive.exe = "11000" OneDrive.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{2e7c0a19-0438-41e9-81e3-3ad3d64f55ba}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\AppID\OneDrive.EXE\AppID = "{EEABD3A3-784D-4334-AAFC-BB13234F17CF}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{F0AF7C30-EAE4-4644-961D-54E6E28708D6}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\TypeLib\{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}\1.0 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{1b7aed4f-fcaf-4da4-8795-c03e635d8edc}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{AEEBAD4E-3E0A-415B-9B94-19C499CD7B6A}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}\TypeLib OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{7B37E4E2-C62F-4914-9620-8FB5062718CC}\VersionIndependentProgID OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{53de12aa-df96-413d-a25e-c75b6528abf2} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{F062BA81-ADFE-4A92-886A-23FD851D6406}\ = "IGetLinkCallback" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{2EB31403-EBE0-41EA-AE91-A1953104EA55}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{D0ED5C72-6197-4AAD-9B16-53FE461DD85C}\TypeLib\Version = "1.0" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{0776ae27-5ab9-4e18-9063-1836da63117a}\ProxyStubClsid32 OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{53de12aa-df96-413d-a25e-c75b6528abf2}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}\ = "ISyncEngineHoldFile" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\ = "IFileSyncOutOfProcServices" OneDrive.exe Set value (int) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\odopen\UseOriginalUrlEncoding = "1" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\FileSyncClient.AutoPlayHandler.1\ = "FileSyncClient AutoPlayHandler Class" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{944903E8-B03F-43A0-8341-872200D2DA9C}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{A78ED123-AB77-406B-9962-2A5D9D2F7F30} OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{4410DC33-BC7C-496B-AA84-4AEA3EEE75F7}\ = "PSFactoryBuffer" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{3A4E62AE-45D9-41D5-85F5-A45B77AB44E5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\SyncEngineCOMServer.SyncEngineCOMServer\CLSID\ = "{AB807329-7324-431B-8B36-DBD581F56E0B}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{EE15BBBB-9E60-4C52-ABCB-7540FF3DF6B3}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{c1439245-96b4-47fc-b391-679386c5d40f}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\SyncEngineFileInfoProvider.SyncEngineFileInfoProvider.1 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{466F31F7-9892-477E-B189-FA5C59DE3603}\TypeLib\Version = "1.0" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\FileSyncClient.FileSyncClient.1\ = "FileSyncClient Class" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{94269C4E-071A-4116-90E6-52E557067E4E}\ = "OOBERequestHandler Class" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{AB807329-7324-431B-8B36-DBD581F56E0B}\VersionIndependentProgID OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{C2FE84F5-E036-4A07-950C-9BFD3EAB983A}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{A0396A93-DC06-4AEF-BEE9-95FFCCAEF20E}\ = "SyncingOverlayHandler Class" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{C5FF006E-2AE9-408C-B85B-2DFDD5449D9C}\InprocServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{1BF42E4C-4AF4-4CFD-A1A0-CF2960B8F63E}\InprocServer32\ThreadingModel = "Apartment" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{5999E1EE-711E-48D2-9884-851A709F543D}\LocalServer32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{c1439245-96b4-47fc-b391-679386c5d40f}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{02C98E2C-6C9F-49F8-9B57-3A6E1AA09A67}\TypeLib OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{ACDB5DB0-C9D5-461C-BAAA-5DCE0B980E40}\TypeLib\ = "{909A6CCD-6810-46C4-89DF-05BE7EB61E6C}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{A926714B-7BFC-4D08-A035-80021395FFA8}\VersionIndependentProgID OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\FileSyncClient.AutoPlayHandler\shell\import\DropTarget\CLSID = "{5999E1EE-711E-48D2-9884-851A709F543D}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{5D5DD08F-A10E-4FEF-BCA7-E73E666FC66C}\ = "IFileSyncClient8" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{71DCE5D6-4B57-496B-AC21-CD5B54EB93FD}\ProgID OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{9489FEB2-1925-4D01-B788-6D912C70F7F2}\VersionIndependentProgID\ = "StorageProviderUriSource.StorageProviderUriSource" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{F062BA81-ADFE-4A92-886A-23FD851D6406} OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{390AF5A7-1390-4255-9BC9-935BFCFA5D57}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{f0440f4e-4884-4a8F-8a45-ba89c00f96f2}\TypeLib\ = "{BAE13F6C-0E2A-4DEB-AA46-B8F55319347C}" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}\ = "FileSyncEx" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Directory\Background\shellex\ContextMenuHandlers\ FileSyncEx\ = "{CB3D0F55-BC2C-4C1A-85ED-23ED75B5106B}" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\CLSID\{389510b7-9e58-40d7-98bf-60b911cb0ea9}\ProgID OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{0299ECA9-80B6-43C8-A79A-FB1C5F19E7D8}\ProxyStubClsid32 OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{22A68885-0FD9-42F6-9DED-4FB174DC7344}\ = "ISetSelectiveSyncInformationCallback" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{B05D37A9-03A2-45CF-8850-F660DF0CBF07}\ = "IOneDriveInfoProvider" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\CLSID\{6bb93b4e-44d8-40e2-bd97-42dbcf18a40f}\LocalServer32\ = "C:\\Users\\Admin\\AppData\\Local\\Microsoft\\OneDrive\\OneDrive.exe /cci" OneDrive.exe Set value (str) \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\Interface\{0f872661-c863-47a4-863f-c065c182858a}\ = "IFileSyncClient4" OneDrive.exe Key created \REGISTRY\USER\S-1-5-21-250031470-1197856012-2659781506-1000_Classes\WOW6432Node\Interface\{8D3F8F15-1DE1-4662-BF93-762EABE988B2}\ProxyStubClsid32 OneDrive.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3740 OneDrive.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 2104 [email protected] 2104 [email protected] 2104 [email protected] 2104 [email protected] 3740 OneDrive.exe 3740 OneDrive.exe 2856 msedge.exe 2856 msedge.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5376 taskmgr.exe Token: SeSystemProfilePrivilege 5376 taskmgr.exe Token: SeCreateGlobalPrivilege 5376 taskmgr.exe Token: 33 5376 taskmgr.exe Token: SeIncBasePriorityPrivilege 5376 taskmgr.exe -
Suspicious use of FindShellTrayWindow 38 IoCs
pid Process 3740 OneDrive.exe 3740 OneDrive.exe 3740 OneDrive.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe -
Suspicious use of SendNotifyMessage 38 IoCs
pid Process 3740 OneDrive.exe 3740 OneDrive.exe 3740 OneDrive.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe 5376 taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3740 OneDrive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4052 wrote to memory of 3900 4052 msedge.exe 113 PID 4052 wrote to memory of 3900 4052 msedge.exe 113 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 728 4052 msedge.exe 114 PID 4052 wrote to memory of 2856 4052 msedge.exe 115 PID 4052 wrote to memory of 2856 4052 msedge.exe 115 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116 PID 4052 wrote to memory of 3596 4052 msedge.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2104
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3028
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"C:\Users\Admin\AppData\Local\Microsoft\OneDrive\OneDrive.exe"1⤵
- Modifies system executable filetype association
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3740
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --default-search-provider=? --out-pipe-name=MSEdgeDefault63c66fe7h7940h4919h8233h2cabaf256cce1⤵
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x120,0x124,0x128,0xfc,0x12c,0x7fffc4bf46f8,0x7fffc4bf4708,0x7fffc4bf47182⤵PID:3900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2136,17590749715553764868,12638972617096604953,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:22⤵PID:728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2136,17590749715553764868,12638972617096604953,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2136,17590749715553764868,12638972617096604953,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2720 /prefetch:82⤵PID:3596
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5124
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5232
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /61⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5376
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
2Change Default File Association
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD50621e31d12b6e16ab28de3e74462a4ce
SHA10af6f056aff6edbbc961676656d8045cbe1be12b
SHA2561fd3365fdb49f26471ce9e348ce54c9bc7b66230118302b32074029d88fb6030
SHA512bf0aa5b97023e19013d01abd3387d074cdd5b57f98ec4b0241058b39f9255a7bbab296dce8617f3368601a3d751a6a66dc207d8dd3fc1cba9cac5f98e3127f6f
-
Filesize
61B
MD54df4574bfbb7e0b0bc56c2c9b12b6c47
SHA181efcbd3e3da8221444a21f45305af6fa4b71907
SHA256e1b77550222c2451772c958e44026abe518a2c8766862f331765788ddd196377
SHA51278b14f60f2d80400fe50360cf303a961685396b7697775d078825a29b717081442d357c2039ad0984d4b622976b0314ede8f478cde320daec118da546cb0682a
-
Filesize
6KB
MD5f83e03a0e1cf0359bc831100c69e93ef
SHA10a49c6d157ab597b7cf98be6690b0e6b7d38ab49
SHA25643c80dc501a9b4d34dae3b523fbca2edca89291d6e799e7369187fab178ebb91
SHA51282207a257981f3346afa7b93ff1e27d52be30cde23ad0c64ec89712ec5e9006c6e777fc786928ba444b8afcbbea2771bc591ddf2ececc3a2e542a1fe236fd317
-
Filesize
8KB
MD5c8c4d60945ab662ace81cb1be92e24be
SHA1a990a6150f855425d18b3048359044e649094c38
SHA2561f5d8ad360f7dc77343496ea17102790306fac875238cf670cb0430dc0f220ce
SHA5127c73a6717a9a439430cb54b0137477afa5d778be55b19f97626808e7786cd1bf00d9d3b210cb1b4aa27c058bf4cd6846c6d9485d40c48e27076a8df5542bf1bd