Analysis
-
max time kernel
57s -
max time network
61s -
platform
windows11-21h2_x64 -
resource
win11-20240508-en -
resource tags
arch:x64arch:x86image:win11-20240508-enlocale:en-usos:windows11-21h2-x64system -
submitted
08-05-2024 15:44
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://personitionw.de/invite/i=3288
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
https://personitionw.de/invite/i=3288
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
https://personitionw.de/invite/i=3288
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
https://personitionw.de/invite/i=3288
Resource
win11-20240508-en
General
-
Target
https://personitionw.de/invite/i=3288
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3107365284-1576850094-161165143-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4320 firefox.exe Token: SeDebugPrivilege 4320 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4320 firefox.exe 4320 firefox.exe 4320 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4320 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4788 wrote to memory of 4320 4788 firefox.exe 79 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 432 4320 firefox.exe 80 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 PID 4320 wrote to memory of 3132 4320 firefox.exe 82 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "https://personitionw.de/invite/i=3288"1⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url https://personitionw.de/invite/i=32882⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.0.183476259\1795007864" -parentBuildID 20230214051806 -prefsHandle 1724 -prefMapHandle 1716 -prefsLen 22074 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0462fc5b-18d7-4631-b48b-27d582db9f43} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 1816 24f713aae58 gpu3⤵PID:432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.1.1207733961\1869749310" -parentBuildID 20230214051806 -prefsHandle 2332 -prefMapHandle 2328 -prefsLen 22925 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {960780b2-df3d-4439-a432-902349534227} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 2360 24f5d089958 socket3⤵PID:3132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.2.624640037\481200749" -childID 1 -isForBrowser -prefsHandle 2840 -prefMapHandle 3224 -prefsLen 22963 -prefMapSize 235121 -jsInitHandle 1340 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25291605-c2df-4c39-97fa-c321d443a991} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 3228 24f74338558 tab3⤵PID:2724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.3.12328281\2085866901" -childID 2 -isForBrowser -prefsHandle 3016 -prefMapHandle 3448 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1340 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {821796fd-73c2-4651-8f18-3f8d0612dd96} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 3028 24f76ed2c58 tab3⤵PID:764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.4.1734965570\2001553255" -childID 3 -isForBrowser -prefsHandle 4672 -prefMapHandle 5160 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1340 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7253146d-7863-45b3-a2e3-a4b66caafb75} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 5196 24f79646758 tab3⤵PID:4540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.5.995347413\304983099" -childID 4 -isForBrowser -prefsHandle 5412 -prefMapHandle 5408 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1340 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b37a8cc1-9efd-4c00-b21d-e4c556bc171b} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 5420 24f79647058 tab3⤵PID:4992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4320.6.1558473013\1122756445" -childID 5 -isForBrowser -prefsHandle 5556 -prefMapHandle 5560 -prefsLen 27614 -prefMapSize 235121 -jsInitHandle 1340 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c1a9930f-452a-442b-9530-a1524978a8b5} 4320 "\\.\pipe\gecko-crash-server-pipe.4320" 5548 24f79647358 tab3⤵PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5483fd0ca5a162f8a0630238cacfc5693
SHA1e979a76fa6b96f637c383fd67f5c407c45e08a1f
SHA2560a7fa27599b7c05a8801422509e441ef2c806a12e874511a5e2d447a049e0cf5
SHA512edb9068beaca72728fe309269591910cb1eb5d4b0027746a14b8367694737bfb042fce421c47b5aab657553b6ba4a5b0098be955d4c4776cad8beb02c20befcf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD53353df5d03ed86e38976e20294c31033
SHA1c409ece891e43d135bcfc3479bf3d9f4567adf98
SHA2561003a1d0f66f54522d568d0ba0dc0b77b7b2881dfaa0a4b1d42e899a803025a5
SHA51223c4d83c09dfb3e90059d5b15e3225660010ce74a6002dae646f02af60e37d7bc98adc9cebc565b732caeb307e2c043527b3e40175bde1cf9f0aa46239710002
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\cache2\entries\CC9AFF3BE02AD27708D587AE49B3DC68644172BA
Filesize13KB
MD5a5153a89c678969b9ec07e0691df6bd3
SHA14f73ae418755ca053d1e42895efe1b2db145d604
SHA2569b837398145d64edd290a4dcd0fb6c5a6b72b7770b46bfa046225d53494f8cb5
SHA51290b1a1951392acb3fc5faf97af717bb9c667b5bec3c8f5ad6b2fc62108ad3f283b91dffc37e090e793088a079b439091c36798800a09e73558a630545b5a7997
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
8KB
MD5240fb83bc8568307ccfee723b27a9118
SHA1dd16f7fa8dc1092975551caa7831c372fe055850
SHA2567cc1b70b901af65bca654a2dd24ff8f3825ab160c7de0bb2be641c014ec71d86
SHA512a801440e0b31d03b9f250cbda5274edeb834b03e48319b089e21f34446f9bf0ada9a4a44845c3633fccba1aa40ff1bbb283e4ddeb6abfe60c5d54bdbcd9e75ab
-
Filesize
10KB
MD59397b2eb5acb127a46d79ed5ac3b1c92
SHA14cf0db49ad1f67e063035d0efc980c0657581043
SHA256a783c7abda6e2ac37e5d13c21f31fb03e6b0c39ba3544553c3666122fb69605c
SHA512760b54a20327046bf823c261c99dd36e3ab8f596faaac7726a4fed428e9fd9b84db3ffe5986d82015e89df40fdb8969b8c7f2d3c1920ef2e87eb410bbeabdd8c
-
Filesize
6KB
MD511757f2909326ab859874bb6a79c849e
SHA18706da0275e8fe1808c4fa3af8ad3e1091f7b50e
SHA256d74b365208e767e6899951facc668346ae6798d770a836685e4b0dfc8583e1ac
SHA512876db110397d444ae541696150ab01e5ca71b547319d4f8a874b5609bf28db875dd3a6e399270f3d8baad605e8b4d0acd997045059e3d0add88ad42c6c25c74a
-
Filesize
6KB
MD538a07b2f6f3610a651f55fcf5f3c16ea
SHA1897247083b289d42fb3ff2e44d61ff2b1ae62f4a
SHA2561b81ba5af4d52ab7621588e03876a73bc578d224fc17f0f38a2f125b699c3591
SHA512086d2f901f6e252af05472525ba806deaa679f20870647428be3d7ae009d562b4ef29ffb352fee59b6933e3509e2b21c53b0d44d61379c349b7d3bab64a64c1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\r6lt1pc6.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5cf2bd25e4dd2a63eafa1b27cdee8eca3
SHA102390714766e105d23ba20b40e96edeb04678ea5
SHA2566d51ca742949c50a595f2ccc557dad4f709bbdcc16b55a2b47a1d4e09fe63540
SHA512e747f7ef0aa010b760dfc7be13da5a533cac5682e32aaad870e90c6d777eb8e0906df6294964d557a4b933c0683d1e824e6b4b4ade4dad4fcfacd75a23b7f86d