Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20/04/2023, 19:06
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cometrbx.xyz/external-files/CometJSONAPI.json
Resource
win10v2004-20230220-en
General
-
Target
https://cometrbx.xyz/external-files/CometJSONAPI.json
Malware Config
Signatures
-
Downloads MZ/PE file
-
Program crash 1 IoCs
pid pid_target Process procid_target 3484 496 WerFault.exe 113 -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Comet 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct Comet 3.exe -
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = d42e80ebae45d901 iexplore.exe -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "388789759" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31028172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{33C1904E-DFBF-11ED-9EF6-62507EA95193} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\RepId\PublicId = "{04BB1068-3E93-4C1F-862B-5DC075ACE47E}" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "157689816" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "157512496" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31028172" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\Software\Microsoft\Internet Explorer\RepId iexplore.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000_Classes\Local Settings iexplore.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\Downloads\Module.dll:Zone.Identifier firefox.exe File created C:\Users\Admin\Downloads\Debug.zip:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 496 Comet 3.exe 496 Comet 3.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2424 OpenWith.exe 2028 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4844 firefox.exe Token: SeDebugPrivilege 4844 firefox.exe Token: SeDebugPrivilege 4844 firefox.exe Token: SeDebugPrivilege 4844 firefox.exe Token: SeDebugPrivilege 496 Comet 3.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3820 iexplore.exe 3820 iexplore.exe 3820 iexplore.exe 3820 iexplore.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3820 iexplore.exe 3820 iexplore.exe 5076 IEXPLORE.EXE 5076 IEXPLORE.EXE 3056 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 2424 OpenWith.exe 3820 iexplore.exe 3820 iexplore.exe 1516 IEXPLORE.EXE 1516 IEXPLORE.EXE 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 2028 OpenWith.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4528 OpenWith.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe 4844 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3820 wrote to memory of 5076 3820 iexplore.exe 86 PID 3820 wrote to memory of 5076 3820 iexplore.exe 86 PID 3820 wrote to memory of 5076 3820 iexplore.exe 86 PID 2424 wrote to memory of 3760 2424 OpenWith.exe 97 PID 2424 wrote to memory of 3760 2424 OpenWith.exe 97 PID 3820 wrote to memory of 1516 3820 iexplore.exe 99 PID 3820 wrote to memory of 1516 3820 iexplore.exe 99 PID 3820 wrote to memory of 1516 3820 iexplore.exe 99 PID 2028 wrote to memory of 2308 2028 OpenWith.exe 101 PID 2028 wrote to memory of 2308 2028 OpenWith.exe 101 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 2308 wrote to memory of 4844 2308 firefox.exe 102 PID 4844 wrote to memory of 4824 4844 firefox.exe 103 PID 4844 wrote to memory of 4824 4844 firefox.exe 103 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 PID 4844 wrote to memory of 2700 4844 firefox.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://cometrbx.xyz/external-files/CometJSONAPI.json1⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3820 CREDAT:17410 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:5076
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3820 CREDAT:17414 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1516
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3056
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:3532
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\Downloads\CometJSONAPI.json2⤵
- Modifies Internet Explorer settings
PID:3760
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "C:\Users\Admin\Downloads\CometJSONAPI.json"2⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url C:\Users\Admin\Downloads\CometJSONAPI.json3⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.0.708397053\1769623347" -parentBuildID 20221007134813 -prefsHandle 1852 -prefMapHandle 1844 -prefsLen 20890 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6840ce84-c5df-40f9-aaa5-662a09896637} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 1932 24d5cc16b58 gpu4⤵PID:4824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.1.1921811612\1265191835" -parentBuildID 20221007134813 -prefsHandle 2344 -prefMapHandle 2340 -prefsLen 21706 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {187c7a8a-0d25-4306-825d-74b7b7ffec29} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 2356 24d4ec72858 socket4⤵PID:2700
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.2.846555373\665870687" -childID 1 -isForBrowser -prefsHandle 3136 -prefMapHandle 3168 -prefsLen 21854 -prefMapSize 232675 -jsInitHandle 1436 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {83604c5f-3659-47db-9113-2ddf51c171f2} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 3200 24d5fa0f458 tab4⤵PID:220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.3.1882029822\1925752474" -childID 2 -isForBrowser -prefsHandle 4040 -prefMapHandle 4028 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1436 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a06cc88-eb56-413b-b5dc-f2749cd3f2e4} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 4052 24d60e46d58 tab4⤵PID:1192
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.4.2073896618\673355154" -childID 3 -isForBrowser -prefsHandle 4764 -prefMapHandle 4760 -prefsLen 26834 -prefMapSize 232675 -jsInitHandle 1436 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8e44aa2-1638-41a0-b2c8-5512487bd56d} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 4772 24d61dea258 tab4⤵PID:1332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.5.2088595918\1098452466" -childID 4 -isForBrowser -prefsHandle 4852 -prefMapHandle 4856 -prefsLen 26834 -prefMapSize 232675 -jsInitHandle 1436 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97751677-d25d-4137-8c3e-e648a0acaf28} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 4936 24d62621258 tab4⤵PID:788
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.6.898165357\354741251" -childID 5 -isForBrowser -prefsHandle 5060 -prefMapHandle 5064 -prefsLen 26834 -prefMapSize 232675 -jsInitHandle 1436 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3cd8800-89d1-4891-9b23-a9a883a0b8c2} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 5048 24d62621558 tab4⤵PID:4100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4844.7.1213105872\288281962" -childID 6 -isForBrowser -prefsHandle 5668 -prefMapHandle 5664 -prefsLen 26891 -prefMapSize 232675 -jsInitHandle 1436 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0509ad6f-256e-4014-8b3d-5ec52f430d82} 4844 "\\.\pipe\gecko-crash-server-pipe.4844" 2948 24d6266dd58 tab4⤵PID:856
-
-
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:4528
-
C:\Users\Admin\Downloads\Debug\Comet 3.exe"C:\Users\Admin\Downloads\Debug\Comet 3.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 496 -s 28042⤵
- Program crash
PID:3484
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 496 -ip 4961⤵PID:4944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460B
MD544f4c7dce53050212ba7647990429dfc
SHA1c471af467a6b9119a7d21766e57b8a9f2c2f751e
SHA256bb2ae1eaf1b69eb60ca389103628505aa63bb470027578c1a9f85c10ea85fcba
SHA51200e7b99e0418011e5664bf7813ee6d5f3b2ad47c5983625a928f85245ad441dc2a39e5f5841e2993e9390653f125f63e04f69ac34453275dfa6c2a5b02516fa7
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\57nap2zl.default-release\activity-stream.discovery_stream.json.tmp
Filesize157KB
MD5c6458f2d04efc19d88264918ee7418bd
SHA1a1e80a5023ea68dcdef28e2d859ecec3748c825b
SHA256659c9aa7a9e03e60f5dff8f48ebf1d72c3cd7e249cfddb3750923cfd477082bc
SHA512581aeda03921e3d0e3587c7811a3564410bb9d7d6da145e9e316cdb53cb8467d8556d6ead017b5656c578d671d5c565c9bbf0daaad65c7843d1215254a084c80
-
Filesize
6KB
MD58ade3e7d684d84eb41b4201d290cb14a
SHA103e98a38fb1d7f44c9c57e93e70160f55bca8994
SHA2561a3e71ff739f055f8076370f966f3ddc60623b391290594c540ba3b119c5a445
SHA512ab23cd1770d5f15047c380ff2dd14902a9a509f40e3b8f00a84f5759e083121bdc4602f6e4483a5709ef9fc3d85339fa4f40b5ce75c3825d8953a25df20b466b
-
Filesize
6KB
MD572c7bf58630e88c2a4780e3a5ff64595
SHA1a97167de9432dbb25eae66d052f1207cc1207f20
SHA2567a90515689bad604324effb487359ada02ddb2b7b4b5e713ff4c7cf4cd671be2
SHA512e0b789a5e390b9d1b4a4a7c99820878c2208e4dc6ee90bdb85a17ffb08be937ffc97c4c5810be714dddfab1f99f05ca36e0b1b7bc4c75397ac878e63f310844a
-
Filesize
7KB
MD52a0558c07291c9cf2760ddf093e6d090
SHA11f2ea31eddea6bd9360cf7c4f0251196243cce90
SHA256b5f4ded0c07f9a6b3030e148d43b5722d40e13349d41c2d9ee7d7f7562636e24
SHA512eb47685e958e2ed84d1ec30d7ed27e84ecc80417a0f1697b47f46ee19f204a52fe36c7b809239d232b178dddac0e0729fc110e085713476a29d58f241e89c872
-
Filesize
7KB
MD5a9a7d56d1d1ce776bddd600e844d3cf4
SHA18915aabb8badf98345bc6be05a52428a7c3c2fc4
SHA256929829c0e5c01fac4703613790aae59ed20731d05265774d9c0a60e8d21eabbd
SHA51284c26c8a3ebec7dc26fe6fa08e731cc24fee29de97a8f4247162ec0194ba82a772eb637b4d7ad03b63bb3838b354f016f80f8e55cacdbe7f85c38e3a7937eaa9
-
Filesize
6KB
MD5f3f901bb37514fc3162b638ef8e98ab1
SHA1ebdf59cd4c3ae7331f5d03b742c30e56b8942b39
SHA256a785157a0cd862551bd220e8049f62a3f363bf2ce2dbec357b4aff7f80073c9c
SHA5128ec07779e92fb65ff1ea8f3472f10a36f66e9ce74941ff82e76e3edb999de5ea6e05bf508dcaec2267e7b7c556013fbdf9ac2a721c9447af4b663d830e9e9e37
-
Filesize
6KB
MD5feb8a52858c8167a58f36caa1b37f116
SHA17ae7f9d2721ae3c579f9e18e4fea679e8c848158
SHA256adbc4c7b5e775c3d401ae811d5be5a69b844f5937e3d0a416d374dd5a7ec227a
SHA512109d42ec5b9744b3561d29a9cabdcf2ffb81233935fa5c2d80c39f27b92ae55366c3c51ae3d26cc1a8936635662acbd11af89e54efac374aceaa279f13e7dc16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\57nap2zl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD550a4b239f5b231d97108e052811add17
SHA12cb2192197270143fe45deff16ab43a2328c3616
SHA2564cbb3a4013c3ef708ff8496e971d535284511e0db7dc1b897bb66ae144965ba4
SHA512115e5befc6eba77cf37694de2684e47a27abc63a355141892c710d67e6a76970d67f8697efec6e3fbf5681c413c4dd6a9bf66a28fefe12045f9161bf00d2002a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\57nap2zl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD572cadf47c5966794b434d39281c6bb5b
SHA12034d3a4aab368cfed87c462c7691e2cd18777a9
SHA256b6026ba25633d4a9749d961ea58becc9945687b8731194432c8a08b1308290b2
SHA5124f3fc6e2a4a39cc16049fc6bc186248f11ca8d91bafe9569b9eb68f187a77dd024e6e79b3247889b8ead84ede50a8b932df209dea15b94e78d92947fc5aeff4e
-
Filesize
460B
MD544f4c7dce53050212ba7647990429dfc
SHA1c471af467a6b9119a7d21766e57b8a9f2c2f751e
SHA256bb2ae1eaf1b69eb60ca389103628505aa63bb470027578c1a9f85c10ea85fcba
SHA51200e7b99e0418011e5664bf7813ee6d5f3b2ad47c5983625a928f85245ad441dc2a39e5f5841e2993e9390653f125f63e04f69ac34453275dfa6c2a5b02516fa7
-
Filesize
100KB
MD5e64dc091208ae009a96362ec8a7b2618
SHA19c744931f9bee868bcc63d629b9b96fa45b66197
SHA2568a71d7514bd0ba9806be298dcb39e9daeda984495dee1e9948f159ae4a1653d5
SHA512b1f57d5bd4af986a3537ab14782dac2ba1b6c0cceb7b1104155982206136dc37ac2ad748562eb69f08ae73cb349c02634ad618f9aef37846a654e5cf026d4c56
-
Filesize
11KB
MD55ac951279c5c97be4fd9b1bd27499364
SHA183806ba005ad6e3dc52b6062ffdf1256e3df48ae
SHA2566a3c53f8261e86419d82f5795519fef693a84473b643efa616212f153a266a57
SHA5123a78d717a28883dd39171221670b06b4e695c633eb99d0cf6e7fe261863cddd82c638762afa6581b5ffa6c6c9eaed81058034dc6d9886a05d3bbe3dbdaa64b47