acl firewall.rtf
acl firewall.rtf
1KB
21-11-2020 22:34
a96fcc8367b78ab708a23e2426c2978d
5ad78c8ac5767a1d9687136dab8c966af5191bf6
0b96038a6be8251415277d6649e9c2393825379c16ef81c44c12bf0a14f48640
Filter: none
-
Reads user/profile data of web browsers
Description
Infostealers often target stored browser data, which can include saved credentials etc.
Tags
TTPs
-
Checks processor information in registryWINWORD.EXEfirefox.exe
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registryWINWORD.EXE
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListenerWINWORD.EXE
Reported IOCs
pid process 732 WINWORD.EXE 732 WINWORD.EXE -
Suspicious use of SetWindowsHookExWINWORD.EXEfirefox.exe
Reported IOCs
pid process 732 WINWORD.EXE 732 WINWORD.EXE 732 WINWORD.EXE 732 WINWORD.EXE 732 WINWORD.EXE 732 WINWORD.EXE 732 WINWORD.EXE 732 WINWORD.EXE 2072 firefox.exe -
Suspicious use of WriteProcessMemoryfirefox.exefirefox.exe
Reported IOCs
description pid process target process PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 1184 wrote to memory of 2072 1184 firefox.exe firefox.exe PID 2072 wrote to memory of 2328 2072 firefox.exe firefox.exe PID 2072 wrote to memory of 2328 2072 firefox.exe firefox.exe
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\acl firewall.rtf" /o ""Checks processor information in registryEnumerates system info in registrySuspicious behavior: AddClipboardFormatListenerSuspicious use of SetWindowsHookEx
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"Checks processor information in registrySuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2072.0.1922378246\1295321885" -parentBuildID 20200403170909 -prefsHandle 1520 -prefMapHandle 1500 -prefsLen 1 -prefMapSize 219631 -appdir "C:\Program Files\Mozilla Firefox\browser" - 2072 "\\.\pipe\gecko-crash-server-pipe.2072" 1616 gpu
-
memory/732-0-0x00007FF99AEA0000-0x00007FF99B4D7000-memory.dmp
-
memory/732-1-0x00007FF99C630000-0x00007FF99F153000-memory.dmp
-
memory/732-2-0x00007FF99C630000-0x00007FF99F153000-memory.dmp
-
memory/732-3-0x00007FF99C630000-0x00007FF99F153000-memory.dmp
-
memory/2072-4-0x0000000000000000-mapping.dmp
-
memory/2328-222-0x0000000000000000-mapping.dmp