Resubmissions
09-04-2024 14:12
240409-rjb9nsce3w 1009-04-2024 14:07
240409-reybcaha47 1009-04-2024 14:00
240409-ra9tksgh55 1009-04-2024 13:53
240409-q67hnagg32 10Analysis
-
max time kernel
147s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09-04-2024 14:07
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://qptr.ru/EDcn
Resource
win10v2004-20240226-en
General
-
Target
https://qptr.ru/EDcn
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
msedge.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 35 IoCs
Processes:
firefox.exeOpenWith.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 firefox.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" firefox.exe Set value (str) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff firefox.exe Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" firefox.exe Set value (data) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 firefox.exe -
NTFS ADS 1 IoCs
Processes:
firefox.exedescription ioc process File created C:\Users\Admin\Downloads\21 YEARS TOGETHER Get a $50 gift card!.html:Zone.Identifier firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
msedge.exemsedge.exepid process 5556 msedge.exe 5556 msedge.exe 5264 msedge.exe 5264 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 2 IoCs
Processes:
msedge.exepid process 5264 msedge.exe 5264 msedge.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe Token: SeDebugPrivilege 2724 firefox.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
firefox.exemsedge.exepid process 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 5264 msedge.exe 5264 msedge.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe -
Suspicious use of SetWindowsHookEx 38 IoCs
Processes:
firefox.exeOpenWith.exepid process 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 2724 firefox.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe 1500 OpenWith.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 4872 wrote to memory of 2724 4872 firefox.exe firefox.exe PID 2724 wrote to memory of 1540 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1540 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 1256 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 4200 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 4200 2724 firefox.exe firefox.exe PID 2724 wrote to memory of 4200 2724 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://qptr.ru/EDcn"1⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://qptr.ru/EDcn2⤵
- Checks processor information in registry
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.0.1786167918\681803147" -parentBuildID 20221007134813 -prefsHandle 1884 -prefMapHandle 1876 -prefsLen 20749 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5aeefa44-011b-4bec-b64c-70e9cbceb33c} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 1972 258e1205f58 gpu3⤵PID:1540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.1.1913483432\358402087" -parentBuildID 20221007134813 -prefsHandle 2384 -prefMapHandle 2380 -prefsLen 21565 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71236430-396c-4d73-94ae-73afb537bbdf} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 2404 258dfefa258 socket3⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.2.332129961\1056548435" -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 3280 -prefsLen 21603 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0c4b0def-83cc-4770-ad36-16c726db7995} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 3296 258e40d9c58 tab3⤵PID:4200
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.3.821248876\906467645" -childID 2 -isForBrowser -prefsHandle 3620 -prefMapHandle 3616 -prefsLen 26066 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0c96f7a-3422-4773-baea-66037f442c06} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 3632 258e5116b58 tab3⤵PID:3596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.4.1683551571\770751484" -childID 3 -isForBrowser -prefsHandle 4788 -prefMapHandle 4800 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c2b10906-351d-46a2-88c7-00db0454ac42} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 4808 258e61e2658 tab3⤵PID:4104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.5.293187869\687151600" -childID 4 -isForBrowser -prefsHandle 4916 -prefMapHandle 4920 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {035d24e9-ac88-47a1-bf98-3dbf50b3d73f} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 1036 258e625d258 tab3⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.6.1937255216\1157225397" -childID 5 -isForBrowser -prefsHandle 5112 -prefMapHandle 5116 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66818e50-89bb-4276-879e-c54ef8c9246d} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 4796 258e626d858 tab3⤵PID:1100
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.7.1535347460\1322196543" -childID 6 -isForBrowser -prefsHandle 3136 -prefMapHandle 3096 -prefsLen 26125 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0b2d19a-3ab6-4320-aca7-ad1f0c9a9cd9} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 2904 258e4158258 tab3⤵PID:1512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2724.8.1658663156\1643964054" -childID 7 -isForBrowser -prefsHandle 5312 -prefMapHandle 5308 -prefsLen 27439 -prefMapSize 233444 -jsInitHandle 1392 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd07406a-472b-4584-9fc5-e45b42c0d5bf} 2724 "\\.\pipe\gecko-crash-server-pipe.2724" 5304 258e4041b58 tab3⤵PID:5984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" "--app=C:\Users\Admin\Downloads\21 YEARS TOGETHER Get a $50 gift card!.html" "C:\Users\Admin\Downloads\21 YEARS TOGETHER Get a $50 gift card!.html"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x11c,0x120,0x124,0xf8,0x128,0x7ff9409e46f8,0x7ff9409e4708,0x7ff9409e47182⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2024,745429433114320957,4616372307342984819,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2060 /prefetch:22⤵PID:5544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2024,745429433114320957,4616372307342984819,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2148 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2024,745429433114320957,4616372307342984819,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2816 /prefetch:82⤵PID:5632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,745429433114320957,4616372307342984819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3252 /prefetch:12⤵PID:5724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2024,745429433114320957,4616372307342984819,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3292 /prefetch:12⤵PID:5732
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5868
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:6016
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4876
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\21 YEARS TOGETHER Get a $50 gift card!.html2⤵PID:5568
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\21 YEARS TOGETHER Get a $50 gift card!_files\a.htm1⤵PID:5180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5a774512b00820b61a51258335097b2c9
SHA138c28d1ea3907a1af6c0443255ab610dd9285095
SHA25601946a2d65e59b66ebc256470ff4861f32edee90a44e31bf67529add95cafef4
SHA512ce109be65060a5e7a872707c6c2ccce3aacd577e59c59d6e23e78d03e3d502f2707713fda40a546ed332e41a56ef90297af99590a5ab02f686a58bcbf3a82da1
-
Filesize
152B
MD5fd7944a4ff1be37517983ffaf5700b11
SHA1c4287796d78e00969af85b7e16a2d04230961240
SHA256b54b41e7ce5600bc653aa7c88abb666976872b2d5e2d657bfc1147a0b49e9d74
SHA51228c58a2ccf39963a8d9f67ea5b93dbccf70b0109b2c8a396a58389cdec9db1205523a95730485bcbc9d533867cbf0e7167ad370fd45740e23656d01d96ee543b
-
Filesize
5KB
MD519709f38817d332dc62be32cd37faf60
SHA13bd16436806dd6d2e36043c1d95d156f77397aa5
SHA256173baea9777eba589a565597bc90acdd65902cce3664153eda10733e7c11997b
SHA512398399d74fc4fa54c839fa482dbb1b52cbc307f6e826664fb57212ee653505bab263e42d2b094e67ac9695e95bad317aeffc497c40b6ecac4927777ebd1678c3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\daf5ae38-149e-4409-b63e-b3cca391fb92.tmp
Filesize6KB
MD586ee7362b4fcb3825a5c1e7dba58ba10
SHA132a85b361bec50817a4a26728c898ade05e3c9f7
SHA256e2971b7061d1de1fd90a911cd1ed67bb8d65688cf976be03251ee897c6960ce0
SHA51278f01faf7da525a8fb8034b4cb3edce59838ee38f3d3253799f43ebbbae68fe5166a04422574ded28b6c737df037dcb386a5107ed18e385ce286d74895ef667b
-
Filesize
10KB
MD53c126c05694b85c5b6089c4f6f9eaa1f
SHA10e8a6d8698bbecb86d34573bfd31aefb9f3757ac
SHA256cae21c9a7d5948442ba1014b2c8c2fa25e46e3d247a22cb9f6e1e1d52688e7dd
SHA512cafab3bb0daba31f1dd8c446417649cb9d2b3067c7f88fb8d10e73f0eb9acc7506d7756b6324e6633891545e7dab93ee072fdba74410d43345f877f080098bec
-
Filesize
9KB
MD5db8bb71526346949ce6efcbf89b8b232
SHA1eea0e0d1f3e448d3e31b6487856ec630225cd6d4
SHA256d913b7cebc61c13dfb5dab6abb4495a2cc527398fd3dbd43fecdb1d346b681d4
SHA512f6e50bb39a16adce74a556e93deb17711f44477824d0baef15f852b8cc045f17622cbfe303fa60d7c3fc0d135aa01c400ee2ec2a3018a30d575a48e52d13f058
-
Filesize
23KB
MD5ea66d25ec354e88857e2c36fe1ce35bc
SHA1e1c9d6925b72151ff8bd40734369c63224b08a7f
SHA2561d130b9804f482bc2894e41b2b055d359bc79502acf8dbd83d61fa550150ae9b
SHA5123eee3c16aff16a43d1cb4b3f85d2a3506cdd6a7864e0990648ec5e378fd7fe102ed8fb1fc81342fecf354a586a04ccb5f8b9ff9f2228a0b0b292aa6a80dfb88f
-
Filesize
9KB
MD5b484fd00ddb3967f8f3316e0c4583cc7
SHA16c317a4f32d784b86501ca885154421cc16967d6
SHA256f03933b7cb26806689dd0a016904967995f081da281819ea94d0a974149a644d
SHA5120d8467a3fc310831c5cdb6e46e123d7e97e938abcb6acdc481ade88a67847460124402b989cb5d2f074a5c4c79c3290e836fcf2f0b7f62fb2e0e3df95f74f2c2
-
Filesize
10KB
MD5e1c120b202789865cf7d77693966233e
SHA1a8567bb6f5c740caa089a38d060321600964dcb2
SHA25693689282a990b25561f911f7ae529702803eb7e32b1e5bf0311e7420fe3eeb0c
SHA51243934b02c9d1ab241c4a86fd68a94dac29fe6ff87036f82d0957eadd9c03b5ec3d41a53711e533f7f9a2a54abac6345e98bb7a55d862a80e605055b4d0c68241
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD504c1d631f0cab769d2f459d229305210
SHA1f8faf6ada60e5d38160574674154d6c5f9105afe
SHA25686b3bf4693830ebf1d7402126708968727fc4cbda6e0a59f1f32ae4ed760fffe
SHA512ccd3b496fa9c02350d9d0f8a06c99b434e8863717f41a3d34a19dfa6f8246b42ac39f9e5f1c01bb97e1e4f0289ddd6a05cf5759b2126903baf4be65a0b8e14d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\datareporting\glean\pending_pings\bc27dd56-e6e9-4177-8a63-658696114f3f
Filesize11KB
MD5c1f81639ade53fd8d93ab46cc8fb4ff8
SHA19f9cbd3bbec164341d74ee12bb6735152f1cba7c
SHA256216d93c21e6d2e2dafb0823dc5bac73be451537dab1c1eea0dadb825f75b84e0
SHA51260aa676ecd649e86267f64e08b9ec78d6a3c4339c662b741657401cf62692f1306235859b56cfed42f19e0554d10df7feef96f0698b624eb2eea3dd70d1f49b3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\datareporting\glean\pending_pings\ecb4bf9a-7ca4-4c32-9934-4ea717d476f7
Filesize746B
MD5614930d413f5288a6180973015e725e0
SHA119d0d5c6f250ff77396a013cb56b8dff50434587
SHA256a4ae034e86fc4634848e6e550246dc95eb859171c592b2c25a7ad98f8cafe8e0
SHA5126e571449692d9f034c33df625344099bff32edd05878cd83555d2eaeb6e2dbd4a25b364340e5c3ffcf5fe04b57e274c360f7af0fed382ddccbc7725dca9a7b1c
-
Filesize
6KB
MD50d2a4c6b800d8604f57504b80190fc97
SHA19416b775e230123cb7d2efea532eea65c0b037c7
SHA256a3c650d25bf59feb8264822ddc84575bc0c2f8353a1838f55c3bec6f3f7ffa4f
SHA5122bef4a52bb4b558cceb5bd0ef18a032c46da6ef3aae1b647039922af47b29de69f70d9cb6ace6a0399272fae44d4ad4a5327cc3567117ecba3b642195857c396
-
Filesize
6KB
MD5b5c1846d39e1c7f45c9d494af90bf8f4
SHA1eb233b82c9215fb98e30aabee2061b9d679388d4
SHA256279c45662a47e8f851a599f97a13b071da4106300e37a85c9336ad905e84abdc
SHA512ea45505efb073a18ca5638b6b00d9be8a51b258834a384656987205bd224cafaccad0cc45e573ee554a10d6fd29d16a8722a5c54f7fafd1a217d9f67f8721398
-
Filesize
6KB
MD53e1b74f2e91f7c5d249ef4c063304f2d
SHA1a4779f83612973673540694d7ab2f76f5d7b2f77
SHA2564a12b5fa879260ad2393debd84543f810048a87573a4e311e6cc278bec88aef6
SHA512d1d937beac3c3ebc53a854a2d7e2153a092e72e1cc9430aee5f20c28a526d016f513885dbf6d8fece9181fcb5e4dbf6e48ff7a9c2189c1c8446e84e940262418
-
Filesize
6KB
MD54fd5cd5aa3043e19adbfa835bc10fdec
SHA1bc292adddb964bf663240b14fde9bd48ca3d81e4
SHA256cfcf0e112bf81dc3fde5c56abfdec9d84b83766f64aab072bd74cdf71a6e830c
SHA512197fd670d00e338f9d19d54154cf56b7863c1ec9586b9c627813b0cd1d393ce0d49f86d8302af6bd417207eee676217ecded05a5a202ff5298f7ad835e2c81a7
-
Filesize
7KB
MD56e4011bec0a7ce0780ec22494d1469f1
SHA18f8daf495edeb667559bdea0dfe9592049a13fb2
SHA256aa86a57badc284108127b47e256dbe3bf2773556963c3906f7c221032ac0f58a
SHA512234b36204b7095aa8fff5c783a7ca4fdedaa8771662ff1b088bc206e9c2e906020ae3836c8620cee5e5b86f3299958f8b08f2c3a0e1c3cb32c56a33fe2dc9305
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD591864f57c9f3f4116dee403dd9bb3b04
SHA116f43a1a377d22c2e565d4cd1a0f855791b59b18
SHA256b982fee08ebdcebd749dd15f59eaf4a71afcadc258dcba31fe149589c045473d
SHA512b86734c717ae890142187c3e1041c3ebafaa0a9138d139599e423c1b3c7870be1c06ece748c6c75f97711d7297701a7b5b2804fe569014afef37b89f395de529
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5de1266d38669390f22e1acf60dbf6427
SHA17f466cf83adf7c6492280ef557e5b2f7ecf1bf36
SHA256fe526e7cf3bb01ebd5bb858ca31a65141171f0649b9f0741364f342da242d269
SHA512310feef739e89da327b797982453cdbdf485b97d88497880170ebb8106e5910e375ce61b70125fd2e35336d420dd77699be47469067a95cbc409f912946b236b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD504e217c661ff904f8dc67b12b962dbb4
SHA1a23e69c251616c8e30e85f28873895501a8ac5ca
SHA256f2e8f0178a567f0329dcb2085be22d590793db1de5a8f8930ec6d6559da148e9
SHA512dab1b9a6b058b21149331b34749957b4cbff0742d1f99454f8bc7e5d790de8eeff3613cf00d1581c415ab175302e3eb5ffbf3ca9d589dbff3898912e038777cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\0z1r4qkh.default-release\storage\default\https+++steamcommumtiy.com\ls\usage
Filesize12B
MD57e48b23ed936d5402e6ecfe23e732678
SHA1396103ef39cfe3d0c131e16d75a4ba69d9d8320e
SHA256ebbb13bff792a5401a5725a917fc395e845d014dc3460f67cc72c4a1432d44b8
SHA512d6fe7200e025bc3f08cc0bfcb62b9e18de6e375d42b23e9a2365ad04ab97dbf340d15c613228115867ed61ad16830ff6206b97ad17246ae5e687aedb4246d25d
-
Filesize
6KB
MD55771660145a946cea3dfdd54231b9865
SHA1e83741e406242ed4ad71843ac51113f1c4479ffb
SHA25618866ee9b90f37b47078e3e7662b18667e4ec79080f47bd933f698fba14b9cbd
SHA512f803632873b4198a6355a4a28948c1177c10cff6c1cf9307e74d442e4847d891e0632650741fd9b5d3a45805b2cecdb9f870075b8272bf7c232a3e97a92694b2
-
Filesize
4KB
MD5e9a215fc934c1a9323d14e3cefc88a79
SHA163b0041f75ee19f8df570a742076f3e9b44c8f72
SHA256200915205f9e7f65e75400f9c6b7eacd7c4fa4bde10a4cdd2ab6b59d8e4e628e
SHA51288d70c61465b53d2c3b9892e3e2c02b7208fcb1273a0dda9050f7b69315db6f24a45a2bbaf3eab97ab54440eb481c211160f964cb288d025ccc560bb6609d035
-
Filesize
195KB
MD57dfcf97c5e21bb87bc0504e7d6b6a22e
SHA10aa4acf7cb1aa2b02150f4ffb37588148e4e0bf2
SHA256c92e59237f6edc0c8a5c740e094cdc7d8d4d8bc0e1fd2776ea64ffced59441d1
SHA5124d07d06e9773af9f31ed6c5dc14f15e9df56d6ef61658cab009254d8b97d781977383a4f5350b91c6782efd42612115e5c595694b5e9e61345d611aa2f2b8bee
-
Filesize
128KB
MD564141792105ea4861f9f33294d65ab81
SHA1506d9100caa070005a890bd496de64c437d6d008
SHA25621758ed084cd0e37e735722ee4f3957ea960628a29dfa6c3ce1a1d47a2d6e4f7
SHA51230e0a9aa84688ac093c09f2f41089c899bf4a9ca5138289d7a4dc64c54ba293936fb2ee6ba724894a09590509863ea7712b6055c28e61639df4d34520b538759
-
Filesize
10KB
MD5d86dcdbfed4c273c4742744941259902
SHA198089a33d0cf2fa4b3e1ba9b7eeb9b8ba0ac82a7
SHA2564b4969fa4ef3594324da2c6d78ce8766fbbc2fd121fff395aedf997db0a99a06
SHA512f10e98f579d36ce13e24dbe3050c09d87f12f94578b80ea1891ca485db48c83619d93a6b74d99639468a746cce872af8742ca4dbcece7a36cfbf097b96b7eaad
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e