Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
27/04/2024, 16:20
Static task
static1
Behavioral task
behavioral1
Sample
notmyfault.exe
Resource
win11-20240419-en
Behavioral task
behavioral2
Sample
notmyfault64.exe
Resource
win11-20240419-en
Behavioral task
behavioral3
Sample
notmyfault64a.exe
Resource
win11-20240419-en
Behavioral task
behavioral4
Sample
notmyfaultc.exe
Resource
win11-20240419-en
Behavioral task
behavioral5
Sample
notmyfaultc64.exe
Resource
win11-20240426-en
Behavioral task
behavioral6
Sample
notmyfaultc64a.exe
Resource
win11-20240419-en
General
-
Target
notmyfault64.exe
-
Size
339KB
-
MD5
c338b6fd5b568411039d8a46394133cf
-
SHA1
06a684c8e8ec66396db2685c0419c8bfb78b1220
-
SHA256
817cd2e8846c5d90782017a7f29daf7915e5e38e6dd165fb81cdd4642e90f218
-
SHA512
161f6746bb526a9a1af8d581ccec796119ea0f2d6d7608a12248c698ec9fc1803afd79f162cdc59357a75a3744ad9363c9ba92ed73dc7c04b14523d54a584b18
-
SSDEEP
6144:M0tmWXSbO1mP1xqDxcW2JjusYmCjO0fNgl:M0tmNb+mLceu9ml
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\myfault.sys notmyfault64.exe File created C:\Windows\system32\drivers\myfault.sys notmyfault64.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1856190483-1022094809-400023910-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: LoadsDriver 2 IoCs
pid Process 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1348 firefox.exe Token: SeDebugPrivilege 1348 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe 1348 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1348 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1796 wrote to memory of 1348 1796 firefox.exe 86 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 4280 1348 firefox.exe 87 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 PID 1348 wrote to memory of 1320 1348 firefox.exe 88 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\notmyfault64.exe"C:\Users\Admin\AppData\Local\Temp\notmyfault64.exe"1⤵
- Drops file in Drivers directory
PID:2628
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4744
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1992 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1908 -prefsLen 25455 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8bd38aa-5803-407b-8a09-5d49b9d6a905} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" gpu3⤵PID:4280
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 25491 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {052f025c-1c39-4f90-a57f-a354f6f95e86} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" socket3⤵PID:1320
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3256 -childID 1 -isForBrowser -prefsHandle 3248 -prefMapHandle 3244 -prefsLen 25632 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {063ed1ce-2899-4dd0-af98-7b3a65b636d0} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" tab3⤵PID:2404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2916 -childID 2 -isForBrowser -prefsHandle 3576 -prefMapHandle 3236 -prefsLen 30865 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6838f25-2d2a-4109-b32e-c9a90764f915} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" tab3⤵PID:948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4304 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4244 -prefMapHandle 4324 -prefsLen 30865 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fdbe4ea-3b77-4fcd-b3f4-745c4f5dfc70} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" utility3⤵
- Checks processor information in registry
PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 3 -isForBrowser -prefsHandle 5232 -prefMapHandle 5324 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7be7858-0d0c-46e3-8603-e507a96449ef} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" tab3⤵PID:1404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5556 -childID 4 -isForBrowser -prefsHandle 5476 -prefMapHandle 5480 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed5ff0ec-7767-406f-aac8-f4cf5634f487} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" tab3⤵PID:1472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5684 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5756 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {434290e8-8178-44ae-ba3a-68a3b17517ae} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" tab3⤵PID:1904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6076 -childID 6 -isForBrowser -prefsHandle 2764 -prefMapHandle 2748 -prefsLen 26990 -prefMapSize 244658 -jsInitHandle 1064 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0a5d62ca-f8bc-41d6-86a7-f6f9e666cc16} 1348 "\\.\pipe\gecko-crash-server-pipe.1348" tab3⤵PID:1452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgyglpox.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5fcea974871770574474065dc10e16782
SHA1f7f249edf2631051bea495ed4bd131dbd7f9c223
SHA256334ba3f328078dab96148595e58003a061f17fc5239fc97ad3a5a30308da8b43
SHA5122e3e45056e1a6638fbb68a32bab14679adce57cfaf2ba4ab6e26e49bf4489d8fb8f234b326a6736516a3366e9870d04a1741a7c6e4c03a426fcf0c8b149e2cbc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\datareporting\glean\db\data.safe.bin
Filesize26KB
MD5b52f744a37efc1c362cb537055f5a359
SHA13a292e8dbc40bf4925a7a5a02a5fa69f74746aa2
SHA256bded37d3560f8c6a90e9b33bdf19b0a5b044d513006b9c6790a0dca7e51e786d
SHA512561fa9ceb60f6400e3208ea180c7e00681bec8f3ef4bc4b536f43127ce91e1ce2474b5f884635bf41a93f15d7d5f3d929c44b6114bbf082272d02516ac065979
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57d2eba2048193af20920a73c77e2e8dc
SHA1c7aef925cbf8e1c60cb510e8dc8c1a7f7ffc6bf3
SHA25693f8cc325687d7bd10869783727ccadf6320767804698cb7edfcd36ec6ec90db
SHA5122b7439f9ea3b78ff13973f1b04f7ca662cc228590203d686e0127cfa31a2e88009a7c25721203cb4fd537f287216d1b3519cdaf2f1a347ff65eb68e610564521
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD59873c6329df991db69c013a81faaa78d
SHA16716b7d02f42c130350ef9a89cb8b75e1df8ee10
SHA256ff0c251d5ba0997be81599dcab535bf96c10409a34316df8797e9dccbea94594
SHA51259a2f75b91fc2c45824de3db415a2cb2ed6bdb08de1d366a1338dc051c08c8a86434083b7ea3710c58ca907179a6d5535fa93304a8a6d4c12f74df95c6372563
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\datareporting\glean\pending_pings\06e964a4-4a86-4b0c-822c-58dca3b274d4
Filesize671B
MD5fe71bab458a2b28c272b654a8c86afec
SHA17b1bec54a72389870ed652cc5f416938d1db961c
SHA2566537d36c16b530919f9d53897dad838a572bf67298392dc9817215631855e1cd
SHA5124aae82161d50866a1d8ebd8788e7d66f1129130dde49b89b14120a34a7e56a3d10111f92cf74f2254e4e7c9cd462cd2fdc306e6f848ec45b4d6476dbc91bb6c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\datareporting\glean\pending_pings\4c686186-590f-4a34-acc9-7303cf7b4bab
Filesize982B
MD50d69d8254f082a5bbc669b6c981f0bd8
SHA13524337821509f601733647a4072cce6fcca43ad
SHA25667dcc68efb1230bd0439e96fb290d5db29ff76801d8a7a2ef3bf0b04f97fe11c
SHA512138d9aa173c2816c195cdede86849bbc5e88c40da6046f54568685cd7300e7dc8f6571149b26afb7e40122852996cab01229a2d1171f876e069e0623e6a139cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\datareporting\glean\pending_pings\acd9ba1e-f63a-4fe5-8934-7cfee9c54455
Filesize25KB
MD57ab5d57c40bf106f72b146f95ad834f0
SHA10c40fe21ec163d9e35fe07b1fe751b5800eca386
SHA256ebf059abb5c756853bd07c073c93c22e9223d4b08d399de34806633a53735ef5
SHA512e8d7e6dab16f0705311933c62ebf176dfeef055413e6e1ddaa84ea7bb9d8c8efb90c2c763a2a9c32a8f7788a86954bd4a3cbf84ccf1a0900298761ad9ec31194
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgyglpox.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD5b3a13a44f627939505a42184bd40ceff
SHA1ddddc44d0982d7e57658d60ee3588ad0af214ea2
SHA2567848853427807b316ed2fa8a3d7a45ac1a4e49447af40c3fccbeef76d8d63534
SHA512f8f0e3d4c299fa441788e86ea442b6801ebf5e93e9d6b6c5c06e2b5e2bfb88cf27b10fa9f771ababea0bc4c5be669d69d7ee60e547211fe6996729679d01f433