Resubmissions
25-06-2024 10:28
240625-mhrwhsxdln 325-06-2024 10:27
240625-mg7wcaxdjk 325-06-2024 08:54
240625-kt32tatanr 320-06-2024 10:33
240620-mlkavasfpg 314-06-2024 11:00
240614-m4d7jsxfrc 314-06-2024 10:50
240614-mxppps1ekk 314-06-2024 10:39
240614-mp8gvaxbjc 311-06-2024 10:04
240611-l3yn5atcmn 311-06-2024 09:55
240611-lx1arssfle 611-06-2024 09:53
240611-lw1j5staqm 3Analysis
-
max time kernel
963s -
max time network
972s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-06-2024 10:04
Static task
static1
Behavioral task
behavioral1
Sample
b28242123ed2cf6000f0aa036844bd29.dll
Resource
win10v2004-20240508-en
General
-
Target
b28242123ed2cf6000f0aa036844bd29.dll
-
Size
87KB
-
MD5
b28242123ed2cf6000f0aa036844bd29
-
SHA1
915f41a6c59ed743803ea0ddde08927ffd623586
-
SHA256
fd563cf7c0c862ab910cf558b5a123354b616e84902d277edf09f378ff6f9786
-
SHA512
08e5966ca90f08c18c582e6c67d71186a6f9c025fc9f78020e1ce202814de094171111b7f3623d81f7371acdf92206446f7c0425e08e8f5f5b6fd969007d9fca
-
SSDEEP
1536:0A1KsVHBnVJ0T1rFTQHUPx+nVP7ZSRILMZoXyqqEbzPCAdt6rFTc:0A1rVIrFTOUsnVP7sRILgAPCvrFTc
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4996 4604 WerFault.exe regsvr32.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
firefox.exedescription pid process Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe Token: SeDebugPrivilege 1588 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
firefox.exepid process 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
firefox.exepid process 1588 firefox.exe 1588 firefox.exe 1588 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 1588 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
regsvr32.exefirefox.exefirefox.exedescription pid process target process PID 3676 wrote to memory of 4604 3676 regsvr32.exe regsvr32.exe PID 3676 wrote to memory of 4604 3676 regsvr32.exe regsvr32.exe PID 3676 wrote to memory of 4604 3676 regsvr32.exe regsvr32.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 4416 wrote to memory of 1588 4416 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 4040 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe PID 1588 wrote to memory of 1408 1588 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\b28242123ed2cf6000f0aa036844bd29.dll1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\AppData\Local\Temp\b28242123ed2cf6000f0aa036844bd29.dll2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4604 -s 5963⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4604 -ip 46041⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.0.1383449765\724277205" -parentBuildID 20230214051806 -prefsHandle 1756 -prefMapHandle 1748 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08b2e27f-30b7-4182-858f-6d8635ccf570} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 1836 1f7cbb23e58 gpu3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.1.706841872\197601511" -parentBuildID 20230214051806 -prefsHandle 2376 -prefMapHandle 2364 -prefsLen 22112 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eac037ca-93cc-4591-a6b3-4071b23abaa0} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 2404 1f7bed89358 socket3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.2.277375714\1316903202" -childID 1 -isForBrowser -prefsHandle 2992 -prefMapHandle 2988 -prefsLen 22150 -prefMapSize 235121 -jsInitHandle 1264 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6679dac5-5e2d-4fd4-a623-47edac5c8c46} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 3004 1f7ce3e6558 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.3.147663269\692915999" -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3540 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 1264 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0e15562-bc60-42a0-b0e7-ff12f1770ac3} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 4004 1f7d0b75058 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.4.766063025\519590492" -childID 3 -isForBrowser -prefsHandle 4900 -prefMapHandle 5084 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1264 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3689f6ba-2865-45cd-8a68-09293084a0d5} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 5080 1f7d2b57658 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.5.1357977188\911343911" -childID 4 -isForBrowser -prefsHandle 5260 -prefMapHandle 5264 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1264 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e722783-09ac-44fb-8810-ce231b776351} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 5252 1f7d2b58258 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.6.713517521\1063101993" -childID 5 -isForBrowser -prefsHandle 5528 -prefMapHandle 5524 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 1264 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db3f7faa-6ca4-473e-b94c-eaa0c2ff752b} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 5536 1f7d3103858 tab3⤵
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1588.7.183819242\1757131366" -childID 6 -isForBrowser -prefsHandle 5312 -prefMapHandle 5316 -prefsLen 27771 -prefMapSize 235121 -jsInitHandle 1264 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d00dcf7-c1cf-4090-9d54-5ca404437f09} 1588 "\\.\pipe\gecko-crash-server-pipe.1588" 5304 1f7bed7c458 tab3⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\activity-stream.discovery_stream.json.tmpFilesize
26KB
MD5a0314dbe45ef000069c233a9471b9f24
SHA1f813c0e71580fde75249ef7555e81e5479476425
SHA256c70755a12f8cc2068d88aeb7b9e1043ff123dd21dc84a8e716632d18c7538087
SHA5123cfb7e1af12eeed81cc816a35d8aedafd957338e3fdedfd47361c72031ff424019778a86b46e2918d0d56b767fa6189621498b62fc0f84825661a081a4a6bf17
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\cache2\entries\099EB2BF8827A4F91EAB3E38B14650D0205226F2Filesize
15KB
MD5d921c136343d6c0784f11b3dcb6015f3
SHA18fd082a576498a6e57f6dedc796116097d6ff8e9
SHA25615ba10b8d43ab2f96093b63d23d366acb98954d1dc45a347edc9d02add7cdf5e
SHA512802112f3c5701007f6270437e503d9802390b9994a2020edcfe1070a947699db97ef66095610b10b76285e9b51f241db39d6e7098133e46bcb93b01731fc3e9d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\6824f4a902c78fbd.customDestinations-msFilesize
5KB
MD5e3cca02ad04023e13bfdef5b34fc68fe
SHA126127b6d08b0e09bc7b0d371ac484b49f2a9207f
SHA256e3470eed6991f99200a7c76e7dbefaa7958d5a72ab3911f5f8b69a561b1647bb
SHA512bac4c95968aacf1f3da073a05dd2b81a6a1b6880689ee6ef85e06b081f699fd5caa57c3a6e5766e6358378b4ac8c23ac5e20b2710c875a471a6dcefdf213c032
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\bookmarkbackups\bookmarks-2024-06-11_11_A4tBoSfkVRtzCVRaQeQBbQ==.jsonlz4Filesize
990B
MD57c86057a3cc6ee546c56f21c3de32b32
SHA14c8dc7f17e3dd8c05d7de9db5bc88539f4f82c5d
SHA256ae991619cbc3424ce6f225e06bd236a185cf19c95e043931b4ba46ddea826cf1
SHA5124ec8b911495bd299cd453c3aeeb77c015484223170c95de9986bd6f1398864e54e0386d2138dc85dd0a54541016cfa5e280cb653837c68185c30cdc503252dce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\broadcast-listeners.jsonFilesize
204B
MD572c95709e1a3b27919e13d28bbe8e8a2
SHA100892decbee63d627057730bfc0c6a4f13099ee4
SHA2569cf589357fceea2f37cd1a925e5d33fd517a44d22a16c357f7fb5d4d187034aa
SHA512613ca9dd2d12afe31fb2c4a8d9337eeecfb58dabaeaaba11404b9a736a4073dfd9b473ba27c1183d3cc91d5a9233a83dce5a135a81f755d978cea9e198209182
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\prefs-1.jsFilesize
7KB
MD59846c56bb748dafc30e25d81fb4968eb
SHA137b386961a1797beb28cd66039c5c0bbf1480b74
SHA2568c8117cbde4578b588d0851607144217850287b8526914b7a1ef03c542309bba
SHA51255b8c8bdd50040c55791d1879ae9f44998c4f01269434962bcf37060016ae7b89d27c19349a3c357e6a1e948f7cc604a26dc7b5b6bd7f88eaeca69fe10f780f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\prefs-1.jsFilesize
7KB
MD5561c701be80f8e8b90f06c4125eee05e
SHA1f6d4a3b1930c11a9c1ad566f301eba8f2c56f1bf
SHA256d2768ee1f9ca5144d1a9f94ae7feae31248e81d823df23c473698ac8dfaf9d15
SHA5126382be96ca9587c91296229fb8c6fbd8316c3d2e89e50197d6ef3b96620bdc85a87a5e36ba34ff97c82176ec5678ab429efd0999a61ac7b2fffa50dd822a517f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\prefs-1.jsFilesize
8KB
MD5bb061aaa96f270363b2cd54c3dd28c78
SHA1e43394a4120b3a0bda59bde35d9b6b03d8485560
SHA25675e83d57d109096d8bbe4de780a451d0e85b9c802932c05a1fddac971e897efd
SHA512fa3c47ac0102d92a665fdb601d1a28487a886c85f44ba80c75c64942acf9efd0df68181e2201e72b5fa7dac94c2eb2dae555e6b6e4a8632de4fd1063ad6f25fe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\sessionCheckpoints.jsonFilesize
90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD58eda0fb44d9bf64082968bd50e4fcecd
SHA1bdd7adca5371303928a30f215a5a88e138bfd169
SHA256dc79c4cbab80176124011349991ce33b00c75cfa397dff90a843bf03fe7a8457
SHA512de2f6efc679195d6a5d0280315632a18e25112219a8f9c80b2563ccd89b9048d00ceec2c85bfc35ad1dc8ec9549182640b1fa3d0835d6c4f3bcdd7d5e30c7356
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\sessionstore-backups\recovery.jsonlz4Filesize
1KB
MD58ca7afe4fc2977389f049d7d952fa9a5
SHA176cad344f34ccb617e491b7f76506f18d5c62172
SHA256355199a5700031af328df8952c347d56aff33640a04a12fef61b89789d57110a
SHA5126044ebffe4fcc0fba9878be2eb72c5cd1f7730c7feca090dd9c6706303690c7efe650d86c027c46f483d10f550de75ad188c1b38b433a6ddbda9792ee3c55f1a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xs8l7p8u.default-release\targeting.snapshot.jsonFilesize
4KB
MD5cb26926ab4f1f2829388b1796394b143
SHA1a1e46065526ce2007a97b6fef1669dae01b9e333
SHA256ed8f5926049975e60965f9328ef86105800d862f28150087b42f6b43ac6a35bd
SHA5123794db85b4b07d6ae49f92955747e232a557ee28794d0c21689213341464c1a61adc3441e23eb725d95d05ed1ffed05f6445bde40534978ee6c62642cb989de6
-
memory/4604-0-0x0000000000400000-0x0000000000443000-memory.dmpFilesize
268KB