Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
15/06/2024, 11:23
240615-nhcx2aydmb 115/06/2024, 11:22
240615-ng1byaydke 115/06/2024, 11:16
240615-ndewtsscnq 1014/06/2024, 17:58
240614-wkcn2svbrk 1014/06/2024, 17:57
240614-wjtaeavbpj 114/06/2024, 17:56
240614-wh8npsvbnj 114/06/2024, 17:55
240614-whjdtavblj 114/06/2024, 16:38
240614-t5wxbaycqb 1014/06/2024, 16:38
240614-t5hppaycpe 114/06/2024, 16:37
240614-t42feaycne 1Analysis
-
max time kernel
21s -
max time network
23s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
14/06/2024, 16:38
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://p1t.fun/?l=1031
Resource
win10v2004-20240508-en
General
-
Target
http://p1t.fun/?l=1031
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4124900551-4068476067-3491212533-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1512 PING.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3956 firefox.exe Token: SeDebugPrivilege 3956 firefox.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3956 firefox.exe 3956 firefox.exe 3956 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3956 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 1328 wrote to memory of 3956 1328 firefox.exe 82 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4420 3956 firefox.exe 83 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 PID 3956 wrote to memory of 4916 3956 firefox.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url "http://p1t.fun/?l=1031"1⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -osint -url http://p1t.fun/?l=10312⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.0.1245042914\405748482" -parentBuildID 20230214051806 -prefsHandle 1764 -prefMapHandle 1756 -prefsLen 22076 -prefMapSize 235121 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f511e3de-8476-4f11-a921-8ede27767b40} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 1844 1e9e7a19b58 gpu3⤵PID:4420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.1.1222453027\1122528128" -parentBuildID 20230214051806 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 22927 -prefMapSize 235121 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {18aa244f-33a1-4a69-b984-6d215aba7c61} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 2440 1e9d3785f58 socket3⤵PID:4916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.2.1341851600\242532868" -childID 1 -isForBrowser -prefsHandle 3008 -prefMapHandle 3004 -prefsLen 22965 -prefMapSize 235121 -jsInitHandle 992 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0209ca92-4d58-4b07-9614-fd7426db4698} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 3020 1e9eaa5b758 tab3⤵PID:3632
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.3.1094392014\781648106" -childID 2 -isForBrowser -prefsHandle 3868 -prefMapHandle 3864 -prefsLen 27616 -prefMapSize 235121 -jsInitHandle 992 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a7cfb66-f1a4-42e9-9b28-d4c752fdb137} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 3872 1e9ec2a3858 tab3⤵PID:4148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.4.56417458\2046881723" -childID 3 -isForBrowser -prefsHandle 5056 -prefMapHandle 5052 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 992 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b05c9bed-9135-4d6c-b6ec-ac70d4edd2b6} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 4988 1e9edf1b858 tab3⤵PID:1300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.5.339026539\914855312" -childID 4 -isForBrowser -prefsHandle 5188 -prefMapHandle 5192 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 992 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0251946a-a716-482a-a012-dd68a9beaf3f} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 5176 1e9edf1ac58 tab3⤵PID:1056
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="3956.6.474602120\1443875982" -childID 5 -isForBrowser -prefsHandle 5384 -prefMapHandle 5388 -prefsLen 27692 -prefMapSize 235121 -jsInitHandle 992 -jsInitLen 246560 -a11yResourceId 64 -parentBuildID 20230214051806 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {207de2ca-3260-4bb5-95e1-45f834b6c9a4} 3956 "\\.\pipe\gecko-crash-server-pipe.3956" 5376 1e9edf1b558 tab3⤵PID:2728
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵PID:736
-
C:\Windows\system32\PING.EXEping google.com2⤵
- Runs ping.exe
PID:1512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD52be323a25cc146821eb4869a87375f62
SHA1570547618b9bd879939f3eb2c22474677cc888d3
SHA256f2ae62f018f22637e6d51f78f9abffbfd2384c60835c370dad1239bfe187b163
SHA51272df91c2b80b421688edac3845e9aa8d1c662d69a6551d071dfa27db76428ed3cbc8c4a5f25e88cec77558ae9ee496227f41cf04ea8b9252e5726dc2d0aab276
-
Filesize
6KB
MD520d124cc1b1194d5cd64b0cc8301ed18
SHA106a9dd518ccac57aa599a3254bea14d1bc1c3e3d
SHA2560df7685295329b196d6a883182e2c9417328d86ccc4d4bca0057e3b9b87a8198
SHA51208723b26e53a9f5f3e0a8359a7b4ac09ca666ffbcc36b28390ed7b802d79e024599a5ee3640ca39eb5f76fd0bd5c3a53eeb03984ee3bf80e25079e884cc70c93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\afevplna.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1018B
MD55b567444f724aac32ee23a1835b504b8
SHA10fe54c3681556097f72904e11d79a27bff0f6db3
SHA25699ac98086cfeacd8ed1f7730035f95c345f01151aaec620ea6f82582c910d92f
SHA512424d749a746050b3bda980e75eb34f1bf7cce1c502df597f211f864def4057898a98c4c17ef39766af89f12e98aaa3f0a8e8637bf26e0e2f94e6a47dcec9ffc6