Analysis
-
max time kernel
598s -
max time network
518s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
31-03-2023 17:15
Static task
static1
Behavioral task
behavioral1
Sample
zblg.zip
Resource
win10-20230220-en
General
-
Target
zblg.zip
-
Size
9.4MB
-
MD5
207b597f03033b2e0644bbbc29f04053
-
SHA1
0ad88c964f6f7eebafa7156080a7bcd90ab32a16
-
SHA256
f1dc920869794df3e258f42f9b99157104cd3f8c14394c1b9d043d6fcda14c0a
-
SHA512
f50cdf77557160a7294406e1f2d57ca789ec42834881069281e88ac334fbaad901229da0e460b26a1b69724a4adbf9d0e92adba9c3ac86aa1603b857789c1db6
-
SSDEEP
49152:h7dI9o//FRKZYIH4Lqq2iPYaTSQjBO5bDhWBw5iDx+HdHg:h7dI9o//FXIH4WiPYaeyQ5bD8Dx+Hi
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\INetCache\counters2.dat SearchProtocolHost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\ESE.TXT SearchIndexer.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{01BE4CFB-129A-452B-A209-F9D40B3B84A5} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000006afbfa8bf563d901 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa\UserChoice SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{F81B1B56-7613-4EE4-BC05-1FAB5DE5C07E} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000763e2925f563d901 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\UserChoice SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\UserChoice\Hash = "XiDOB8G+8mM=" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds\_.wpl = "1" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\UserChoice\Hash = "zWWVouylkb0=" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts\UserChoice\Hash = "bD9y9vpESxU=" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.crw\UserChoice\Hash = "16NnxFsKu/A=" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\msxml3r.dll,-1 = "XML Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.svg SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi\UserChoice SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-10 = "Microsoft Hangul Decomposition Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds\_.cr2 = "1" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp3 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-1 = "Microsoft Language Detection" SearchIndexer.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\UserChoice\ProgId = "AppX43hnxtbyyps62jhe9sqpdzxn1790zetc" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.dib\UserChoice\Hash = "RGcpuo8oGEI=" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds\_.html = "1" SearchProtocolHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{1E589E9D-8A8D-46D9-A2F9-E6D4F8161EE9} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 0100000000000000a49f741ef563d901 SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SearchFilterHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-121 = "Microsoft Word 97 - 2003 Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\UserChoice\ProgId = "AppXqj98qxeaynz6dv4459ayz6bnqxbyaqcs" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\System32\ieframe.dll,-914 = "SVG Document" SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds\_.m4v = "1" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.crw SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.adts SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.png\UserChoice\ProgId = "AppX43hnxtbyyps62jhe9sqpdzxn1790zetc" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg\UserChoice\Hash = "ijywVIlAtKo=" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\UserChoice\ProgId = "AppX4hxtad77fbk3jkkeerkrm0ze94wjf3s9" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\notepad.exe,-469 = "Text Document" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.m4v SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-111 = "Microsoft Excel Macro-Enabled Template" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@windows.storage.dll,-21824 = "Camera Roll" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.cr2\UserChoice\ProgId = "AppX43hnxtbyyps62jhe9sqpdzxn1790zetc" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.html\OpenWithList SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice\ProgId = "AppX4hxtad77fbk3jkkeerkrm0ze94wjf3s9" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Program Files\Microsoft Office\Root\VFS\ProgramFilesCommonX86\Microsoft Shared\Office16\oregres.dll,-194 = "Microsoft Excel Add-In" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My SearchFilterHost.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached\{5985FC23-2588-4D9A-B38B-7E7AFFAB3155} {886D8EEB-8CF2-4446-8D02-CDBA1DBDCF99} 0xFFFF = 01000000000000003d4db20af563d901 SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.TS\UserChoice\Hash = "sJ9pW1xxu9U=" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wav\UserChoice\Hash = "7Nhm1QxhTJc=" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\C:\Windows\system32,@elscore.dll,-8 = "Microsoft Malayalam to Latin Transliteration" SearchIndexer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\OpenWithList SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mpa SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds\_.wav = "1" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpg\UserChoice SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.wmv\UserChoice\Hash = "uVD2p4jkfN4=" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.htm\UserChoice\Hash = "Dq/G45K9yQk=" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.avi SearchProtocolHost.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\FileAssociations\ProgIds\_.mp4v = "1" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.jpeg SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\unregmp2.exe,-9914 = "Windows Media Audio/Video file" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e\52C64B7E\@C:\Windows\system32\windows.storage.dll,-10152 = "File folder" SearchProtocolHost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.mp4v\UserChoice\ProgId = "AppX6eg8h5sxqq90pv53845wmnbewywdqq5h" SearchProtocolHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\MPEG2Demultiplexer SearchFilterHost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\{4EFE2452-168A-11D1-BC76-00C04FB9453B}\Default MidiOut Device SearchFilterHost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1311743041-1167936498-546579926-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
description pid Process Token: 33 4912 SearchIndexer.exe Token: SeIncBasePriorityPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeTakeOwnershipPrivilege 4912 SearchIndexer.exe Token: SeRestorePrivilege 2756 7zG.exe Token: 35 2756 7zG.exe Token: SeSecurityPrivilege 2756 7zG.exe Token: SeSecurityPrivilege 2756 7zG.exe Token: SeDebugPrivilege 4908 firefox.exe Token: SeDebugPrivilege 4908 firefox.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2756 7zG.exe 2756 7zG.exe 4908 firefox.exe 4908 firefox.exe 4908 firefox.exe 4908 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4908 firefox.exe 4908 firefox.exe 4908 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4908 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4912 wrote to memory of 4968 4912 SearchIndexer.exe 73 PID 4912 wrote to memory of 4968 4912 SearchIndexer.exe 73 PID 4912 wrote to memory of 4376 4912 SearchIndexer.exe 74 PID 4912 wrote to memory of 4376 4912 SearchIndexer.exe 74 PID 4912 wrote to memory of 5052 4912 SearchIndexer.exe 75 PID 4912 wrote to memory of 5052 4912 SearchIndexer.exe 75 PID 4912 wrote to memory of 1724 4912 SearchIndexer.exe 80 PID 4912 wrote to memory of 1724 4912 SearchIndexer.exe 80 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 2812 wrote to memory of 4908 2812 firefox.exe 83 PID 4908 wrote to memory of 2780 4908 firefox.exe 84 PID 4908 wrote to memory of 2780 4908 firefox.exe 84 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 PID 4908 wrote to memory of 4704 4908 firefox.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\zblg.zip1⤵PID:2288
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4516
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe1_ Global\UsGthrCtrlFltPipeMssGthrPipe1 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:4968
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 6922⤵
- Modifies data under HKEY_USERS
PID:4376
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 6922⤵
- Modifies data under HKEY_USERS
PID:5052
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 684 688 696 8192 6922⤵PID:1724
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\zblg\" -spe -an -ai#7zMap5051:66:7zEvent75991⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2756
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.0.1426141527\1949290519" -parentBuildID 20221007134813 -prefsHandle 1604 -prefMapHandle 1596 -prefsLen 20888 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {13a132a6-cab7-4ef7-927f-89046368c5dc} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 1704 1387eef7e58 gpu3⤵PID:2780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.1.143944937\517497662" -parentBuildID 20221007134813 -prefsHandle 2040 -prefMapHandle 2036 -prefsLen 20969 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d3d274f-bd89-428d-85db-075dab59c394} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 2056 1387e537858 socket3⤵
- Checks processor information in registry
PID:4704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.2.450823334\1410011908" -childID 1 -isForBrowser -prefsHandle 2584 -prefMapHandle 2680 -prefsLen 21052 -prefMapSize 232675 -jsInitHandle 1208 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9696b84-f583-4c24-9aa2-85947464bf10} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 2928 1380313b258 tab3⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.3.834776222\1286313119" -childID 2 -isForBrowser -prefsHandle 3480 -prefMapHandle 3476 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1208 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b2ecd99-4e1c-4da8-8244-f351ca08a90e} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 3492 1387425b258 tab3⤵PID:3488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.4.1352865539\1279866790" -childID 3 -isForBrowser -prefsHandle 3480 -prefMapHandle 3476 -prefsLen 26562 -prefMapSize 232675 -jsInitHandle 1208 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8fb02797-fc0e-469a-b9d1-adccdd1a8df0} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 3808 138040e7c58 tab3⤵PID:4116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.5.1271296238\415675239" -childID 4 -isForBrowser -prefsHandle 4420 -prefMapHandle 4580 -prefsLen 26702 -prefMapSize 232675 -jsInitHandle 1208 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7139c271-35ad-4f9c-98d6-47b915ccf3ff} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 4568 13801844858 tab3⤵PID:2180
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.6.368476787\1867277444" -childID 5 -isForBrowser -prefsHandle 4728 -prefMapHandle 4732 -prefsLen 26702 -prefMapSize 232675 -jsInitHandle 1208 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd2bd833-c0f3-46da-aed9-222291cb6999} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 4600 13805a4f858 tab3⤵PID:1872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4908.7.461029614\899782381" -childID 6 -isForBrowser -prefsHandle 4936 -prefMapHandle 4940 -prefsLen 26702 -prefMapSize 232675 -jsInitHandle 1208 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4232f897-01cd-4a86-8337-f062dc6cf1b4} 4908 "\\.\pipe\gecko-crash-server-pipe.4908" 4928 13806108958 tab3⤵PID:996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\p4wuoroe.default-release\activity-stream.discovery_stream.json.tmp
Filesize146KB
MD577565cb63bbb099782f2aa80fd0f3c36
SHA1c401e02239aea86689801f0d132bb1846e5a749a
SHA25651dfda560c5285361f046e7a2eb4e744f2d7fa780a2a065471ba19d6681d2155
SHA51290bd42b7cb548f6bc1f1119aa8fc89c8d41f34d0d2ee8347f23d6fc296767f06afd0e12f646d85c94d073fc19964f76455c0855a0228c0e9e6217cfdb6086ea7
-
Filesize
6KB
MD5fc03769491e92557713bff75b3dcae44
SHA1a4f4687575dba8a950a014c93d8f9f086a2b68d6
SHA2563e943e423e8dd73d3afd2444234e9c1ca4eebd430da878f5bcc15e2141da7375
SHA5128e2266f0af8f7833397b36b31482a43a4bd798693e069f8aeb823d12b767bcdac3aed772ce10b8907fca777436e4efc39ecb5172e81d2672f1165a2427b709b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p4wuoroe.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD585dcc6db40462b05f8986c9f79f3d8a9
SHA1269e9654ba7fdb296028c5a9774de1da8806c925
SHA2569dd5c5ab6eda424b0a772c0eb62e6150e5e56f58ba4b3e63444b7fdb753f9049
SHA5126a7244bda77718d6cc83d015bc717de92ccf94f1a5757b81760bbd766ada30b4a2863bca4c01ecc47adced597dd3728611620d8643c364c2624d89c83a9c5bac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\p4wuoroe.default-release\sessionstore.jsonlz4
Filesize896B
MD557099655621fbc7c8b9fd6ae7ffeb514
SHA1a2e3b8e915520b5cfa2e260ed6b0f1e093cb63f6
SHA256e88d57eff320a9328437536ad8f8fb9548b466e3a3d5c1fe47a72b6d6314a2d4
SHA5122250273bb8187ef9a3a9bfb5bf4d801e2e434e444baa63629bece472a2e7dacb16f7c27365d33bb12cde2afe0beaf1e5592b2f3c0452650598419455d00746c9