Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
6Static
static
1MHDDoS-main.zip
windows7-x64
1MHDDoS-main.zip
windows10-2004-x64
1MHDDoS-mai...NG.yml
windows7-x64
3MHDDoS-mai...NG.yml
windows10-2004-x64
3MHDDoS-mai...rt.yml
windows7-x64
3MHDDoS-mai...rt.yml
windows10-2004-x64
3MHDDoS-mai...ig.yml
windows7-x64
3MHDDoS-mai...ig.yml
windows10-2004-x64
3MHDDoS-mai...st.yml
windows7-x64
6MHDDoS-mai...st.yml
windows10-2004-x64
3MHDDoS-mai...ot.yml
windows7-x64
3MHDDoS-mai...ot.yml
windows10-2004-x64
3MHDDoS-mai...is.yml
windows7-x64
3MHDDoS-mai...is.yml
windows10-2004-x64
3MHDDoS-mai...ge.yml
windows7-x64
3MHDDoS-mai...ge.yml
windows10-2004-x64
3MHDDoS-mai...ignore
windows7-x64
3MHDDoS-mai...ignore
windows10-2004-x64
3MHDDoS-mai...erfile
windows7-x64
1MHDDoS-mai...erfile
windows10-2004-x64
1MHDDoS-main/LICENSE
windows7-x64
1MHDDoS-main/LICENSE
windows10-2004-x64
1MHDDoS-main/README.md
windows7-x64
3MHDDoS-main/README.md
windows10-2004-x64
3MHDDoS-mai...g.json
windows7-x64
3MHDDoS-mai...g.json
windows10-2004-x64
3MHDDoS-mai...tp.txt
windows7-x64
1MHDDoS-mai...tp.txt
windows10-2004-x64
1MHDDoS-mai...rs.txt
windows7-x64
1MHDDoS-mai...rs.txt
windows10-2004-x64
1MHDDoS-mai...nt.txt
windows7-x64
1MHDDoS-mai...nt.txt
windows10-2004-x64
1Analysis
-
max time kernel
100s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/04/2024, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
MHDDoS-main.zip
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
MHDDoS-main.zip
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
MHDDoS-main/.github/FUNDING.yml
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
MHDDoS-main/.github/FUNDING.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
MHDDoS-main/.github/ISSUE_TEMPLATE/bug_report.yml
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
MHDDoS-main/.github/ISSUE_TEMPLATE/bug_report.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral7
Sample
MHDDoS-main/.github/ISSUE_TEMPLATE/config.yml
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
MHDDoS-main/.github/ISSUE_TEMPLATE/config.yml
Resource
win10v2004-20231215-en
Behavioral task
behavioral9
Sample
MHDDoS-main/.github/ISSUE_TEMPLATE/feature_request.yml
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
MHDDoS-main/.github/ISSUE_TEMPLATE/feature_request.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
MHDDoS-main/.github/dependabot.yml
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
MHDDoS-main/.github/dependabot.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral13
Sample
MHDDoS-main/.github/workflows/codeql-analysis.yml
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
MHDDoS-main/.github/workflows/codeql-analysis.yml
Resource
win10v2004-20240319-en
Behavioral task
behavioral15
Sample
MHDDoS-main/.github/workflows/docker-image.yml
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
MHDDoS-main/.github/workflows/docker-image.yml
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
MHDDoS-main/.gitignore
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
MHDDoS-main/.gitignore
Resource
win10v2004-20240226-en
Behavioral task
behavioral19
Sample
MHDDoS-main/Dockerfile
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
MHDDoS-main/Dockerfile
Resource
win10v2004-20240226-en
Behavioral task
behavioral21
Sample
MHDDoS-main/LICENSE
Resource
win7-20240221-en
Behavioral task
behavioral22
Sample
MHDDoS-main/LICENSE
Resource
win10v2004-20231215-en
Behavioral task
behavioral23
Sample
MHDDoS-main/README.md
Resource
win7-20240220-en
Behavioral task
behavioral24
Sample
MHDDoS-main/README.md
Resource
win10v2004-20240226-en
Behavioral task
behavioral25
Sample
MHDDoS-main/config.json
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
MHDDoS-main/config.json
Resource
win10v2004-20240226-en
Behavioral task
behavioral27
Sample
MHDDoS-main/files/proxies/http.txt
Resource
win7-20240215-en
Behavioral task
behavioral28
Sample
MHDDoS-main/files/proxies/http.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
MHDDoS-main/files/referers.txt
Resource
win7-20240221-en
Behavioral task
behavioral30
Sample
MHDDoS-main/files/referers.txt
Resource
win10v2004-20240226-en
Behavioral task
behavioral31
Sample
MHDDoS-main/files/useragent.txt
Resource
win7-20240221-en
Behavioral task
behavioral32
Sample
MHDDoS-main/files/useragent.txt
Resource
win10v2004-20240226-en
General
-
Target
MHDDoS-main/.github/ISSUE_TEMPLATE/feature_request.yml
-
Size
1KB
-
MD5
680511c3c3279ecdd90f8ae3e0693e52
-
SHA1
a7fe4f69397f2f9b83faf2dc99f38dbc09e5479d
-
SHA256
b73780a4ce64a133ec19109b9118d5e24979dbc27bf89a1a70ed8277708db2a9
-
SHA512
532fe3509d9dc3453766937d7b2327d4e9d749b6ea87440f39d452f619c599a5808ce5691d1dd44346e9354febe22d2eaf10ad02e162b452068d08000caf9de9
Malware Config
Signatures
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Saved Games\Microsoft Games\desktop.ini solitaire.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 9 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\yml_auto_file rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\yml_auto_file\ rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\yml_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft solitaire.exe Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF}\LastPlayed = "0" solitaire.exe Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.yml\ = "yml_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\yml_auto_file\shell\Read\command rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats\{8669ECE8-D1C3-4345-8310-E60F6D44FDAF} solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\.yml rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\yml_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\yml_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows solitaire.exe Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000_CLASSES\Local Settings\Software\Microsoft\Windows\GameUX\GameStats solitaire.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3148 solitaire.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1384 firefox.exe Token: SeDebugPrivilege 1384 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 1384 firefox.exe 1384 firefox.exe 1384 firefox.exe 1384 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1384 firefox.exe 1384 firefox.exe 1384 firefox.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2432 AcroRd32.exe 2432 AcroRd32.exe 2432 AcroRd32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2624 1728 cmd.exe 29 PID 1728 wrote to memory of 2624 1728 cmd.exe 29 PID 1728 wrote to memory of 2624 1728 cmd.exe 29 PID 2624 wrote to memory of 2432 2624 rundll32.exe 30 PID 2624 wrote to memory of 2432 2624 rundll32.exe 30 PID 2624 wrote to memory of 2432 2624 rundll32.exe 30 PID 2624 wrote to memory of 2432 2624 rundll32.exe 30 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1336 wrote to memory of 1384 1336 firefox.exe 35 PID 1384 wrote to memory of 1612 1384 firefox.exe 36 PID 1384 wrote to memory of 1612 1384 firefox.exe 36 PID 1384 wrote to memory of 1612 1384 firefox.exe 36 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 PID 1384 wrote to memory of 336 1384 firefox.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\MHDDoS-main\.github\ISSUE_TEMPLATE\feature_request.yml1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\MHDDoS-main\.github\ISSUE_TEMPLATE\feature_request.yml2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\MHDDoS-main\.github\ISSUE_TEMPLATE\feature_request.yml"3⤵
- Suspicious use of SetWindowsHookEx
PID:2432
-
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.0.833838557\178368368" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {48aeface-5988-4c86-8d0c-05f289dba036} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 1300 11ec1158 gpu3⤵PID:1612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.1.1550566735\2115621337" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 20830 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c0a3310-83b9-4c78-b509-d47742705c9f} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 1504 e71658 socket3⤵
- Checks processor information in registry
PID:336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.2.1194315621\713783095" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 2080 -prefsLen 20868 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b703c5f7-2e6e-429a-a83c-6e0c537c7aa8} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 2096 1a3abb58 tab3⤵PID:3056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.3.2025419603\46600840" -childID 2 -isForBrowser -prefsHandle 1668 -prefMapHandle 1648 -prefsLen 26111 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {225defc2-42ce-470e-9352-8462182ab3ff} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 752 e71f58 tab3⤵PID:1936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.4.1667112528\1676473943" -childID 3 -isForBrowser -prefsHandle 2792 -prefMapHandle 2788 -prefsLen 26111 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8616ff8e-448c-4826-bb8c-0a85b9ed7622} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 2804 1bb33558 tab3⤵PID:284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.5.1690821569\806178723" -childID 4 -isForBrowser -prefsHandle 1108 -prefMapHandle 1936 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f1bfce7-13d3-4b48-b7b8-d46ab7ce7f0a} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 3684 1d9f3258 tab3⤵PID:1336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.6.1699835778\617009792" -childID 5 -isForBrowser -prefsHandle 3792 -prefMapHandle 3796 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6b8895d0-b2bc-45c9-a44f-bac56b3994a4} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 3780 1e8c9158 tab3⤵PID:604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.7.127161894\1818904422" -childID 6 -isForBrowser -prefsHandle 3976 -prefMapHandle 3980 -prefsLen 26170 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3007cb43-5d90-4b51-8fa5-5c18a8851b7d} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 3964 1e8c9d58 tab3⤵PID:544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.8.1669774981\675883153" -childID 7 -isForBrowser -prefsHandle 4156 -prefMapHandle 4248 -prefsLen 26251 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f8aa9931-0429-4552-aabf-77de3bb4d68a} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 4288 22039758 tab3⤵PID:1892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.9.656028838\1714142846" -parentBuildID 20221007134813 -prefsHandle 4548 -prefMapHandle 4544 -prefsLen 26251 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b19297cb-81b5-498f-84bc-5e6d294d6594} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 4560 2245a758 rdd3⤵PID:1712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.10.730165055\960885065" -parentBuildID 20221007134813 -sandboxingKind 1 -prefsHandle 4660 -prefMapHandle 4656 -prefsLen 26251 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b480bdbb-cf53-4b11-a0c6-606b7971b71d} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 4672 21076258 utility3⤵PID:2812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.11.447135606\348119655" -childID 8 -isForBrowser -prefsHandle 4820 -prefMapHandle 4772 -prefsLen 26251 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {297ea801-0ff2-4b85-8644-784c1863532a} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 4832 21266558 tab3⤵PID:2828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1384.12.1552237180\742958189" -childID 9 -isForBrowser -prefsHandle 5076 -prefMapHandle 5072 -prefsLen 26251 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {79d83777-3698-4456-b177-bdfc38a030fb} 1384 "\\.\pipe\gecko-crash-server-pipe.1384" 5088 224a7258 tab3⤵PID:3196
-
-
-
C:\Program Files\Microsoft Games\solitaire\solitaire.exe"C:\Program Files\Microsoft Games\solitaire\solitaire.exe"1⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
PID:3148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5fa9fd61b2e66ac6f134d65b3e87343b7
SHA16a9b36f4c9e00eaeba6dd36805bbe0304f890236
SHA256053ce86b9e0da0951cbc6d7f1457c12df6de13cf5040b04717a6c6668bc5129b
SHA512cb2ee654af73c431d0e2ddce079c06d5442dc7dd275dcf55a4f4e1f9627e3cca47a5d705e262d5f85c9057f35aa58baae09dd775f54f320170484d18a088e2fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD509bb3bab76867e98fab79a34747dc2bb
SHA18b25d8cc438862b11b1c4f8356641558e127fa2f
SHA25617890193dae4e4a7b12a26e369b8f5d9d2598a73d2100311193a903dcc778f1c
SHA512fe894ccf2e1847f0d6b810f6a6de523a54126459c3b09c09bf1c70eb2d859e2cbc64803f6075c8b2bd0ed7abf9acaf89433d970e319644eedf27e0fff9b56fa3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\datareporting\glean\pending_pings\a8c66267-919a-4637-b110-381872ccb6da
Filesize10KB
MD57c661cc858510c9db2b557db42af7aef
SHA1c9515d21f437243f0340fc9ec03d2c9e26fcdb6a
SHA2566f60e50e5f3f24c5fcaf1bfcb3e634a2d3c408041154dd0f7ee30782f0602d48
SHA5120a40d9de23ed503c2c123e3fdc58efe6135911e254ba58505ea7ab4c275d8a71f3978b42e859a9b291097dafb35c5ae4dbe4804f6d1236583399fe6ad183c0ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\datareporting\glean\pending_pings\c08dfa8b-9edc-478b-bbb4-30f8a8cb3411
Filesize745B
MD55aceee0bdd2b6526d2ef63792b972232
SHA185df630778f7c6ab3532646b8e535d85ada11ce1
SHA2569d2785759746c59ecfdc9847ede8a18b635e8d64fda954d1376e053e703cfe4c
SHA512a477f7666162de54ed2ec3697bd17c20cb40e64311702895dbf32d4057bef5182b44e3c574c3f6edf59f269ab67bdcbd321b0b41cc14d21a81603eb74e820289
-
Filesize
6KB
MD51a0a8580274020bea8a5b402bb218cfe
SHA18d026065bb111b86f1a8984624052d904a93476c
SHA25681dce6689b4e797ba0632c636871f721d241262dddd4164f27cc9a8aecd2a347
SHA512b76041920402e41ad264376ac06f976a3e9381926d44bf9467aa371ee789f0595db028fc7fcf3b0fd829daf591dcee135a876f372f46f0bc1def8e8ed5f5578d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d8566c7a03b9f95e5aa8248abc2ff0ba
SHA1b93dae76ba94ca8c730757eec36cf5b19a1bc167
SHA256d32314f919dabb601ff8806b7bda9eb2c3ce560b9d911867d3022a60bb14241d
SHA5121731c95e5b668051ea6de9f7f0057cd66e54107161333a1e075c13b6cacfdc52a38a0cd6b9b976d9015cd5be02645e4e45c708afe5e459ac6ffd2c774f9c0ff1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5de5e85f9cd6d444aae46ae4c17c16c1f
SHA127622107dcd0aff8dc108f973e31ded6f630621b
SHA25606d97e7de01c894e684ba8a626317721735f32025ddf03b284579c7af9d41d1d
SHA51267c8eafa2979bf6a63606a6dd8c186e25f0a209e259a462fa126fb5a4251e557f517a91aa22da7bd19c80223ee4b63c9a507ae757d733659b076ead6007db693
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\sessionstore.jsonlz4
Filesize3KB
MD58a54c50c2ddd3ffa1f9ab2b5adebc719
SHA1267cb5c079e9da0672552d752dce21570466efbe
SHA256d478a314ca2fa70c5ae08670a25c8c8b8751b36965dd46b7b19e4a75b29eade8
SHA512a04d4a83e1e1f6a12dac0af8bffc8b56d4cc85d502de36aa22c932ed5a4427be4b6595c3009faa3083d5378d9100c7c47a99d7fce815dc898bf9f253bc23031a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\storage\default\https+++www.youtube.com\cache\morgue\152\{83810993-f92d-4b18-8449-fd9625bd8b98}.final
Filesize192B
MD52a252393b98be6348c4ba18003cc3471
SHA140f75302fcbe4a8ac2e33a8d9daf801abc2a9598
SHA25604cae3c7b208fc55b25763913d0bbdc99232942086efdf705f2a27764be6f5ee
SHA51207af4a7b0d10f1b5e1fe0877b21abc98483d78797608a1763cfb71e25559fdce10d20f03c16f4284d7ae7ab90266f45240425e3a264de9525ec1657345b85198
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0rowjuc9.default-release\storage\default\https+++www.youtube.com\idb\213583328yCt7-%iCt7-%r4eas9p7o.sqlite
Filesize48KB
MD5485188e029d5ef68073f08960acf78ca
SHA17d0738345f95cadbc312a182e155e531642505a8
SHA256842b372f82f9849e17275e0762451ccb97df5e2a0727e13c9d012e773ed58ded
SHA5126ebfb66cbe5d12029005b95e6832ced3a6dd300306c66541d436a525973c1c77f24292b5ea165b301678e4582dbd4eb0e79624164743235668f2d5b46edb445c