Resubmissions

15-06-2024 08:25

240615-kbj6zstfje 10

15-06-2024 08:10

240615-j28ftstckf 10

Analysis

  • max time kernel
    110s
  • max time network
    111s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    15-06-2024 08:25

General

  • Target

    ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe

  • Size

    241KB

  • MD5

    ad795aebd3065a1b1afd33df18590758

  • SHA1

    de6fde3aafbb8da8bf6de2ccf4c3507e71b2cd8f

  • SHA256

    56a479280a54fad7a582c3ff8623c885210cf49432a29592c91f2bd95bf6ac3d

  • SHA512

    a6c12d0572cc548b7dfd1e792887ecbac8c98d88e5717ae9364eaa43b751ab49f4c8f9480536fc6c87dca9802a119d56240aa0d68276f16666e20d2aec4923a5

  • SSDEEP

    6144:Kn/L+GOmXqA8VtR4ZhSTpkdpNRauPmuRfV/A/ETrSQ1tj:0zOmXqActRYhgk5Ra6mkflTrSq

Malware Config

Extracted

Path

C:\Users\Admin\Documents\README.hta

Ransom Note
<!DOCTYPE html><html lang="en"><head><meta charset="utf-8"><title>CERBER RANSOMWARE - Instructions</title><HTA:APPLICATION APPLICATIONNAME="Cerber Ransomware - Instructions" SCROLL="yes" SINGLEINSTANCE="yes" WINDOWSTATE="maximize"><style>a {color: #04a;text-decoration: none;}a:hover {text-decoration: underline;}body {background-color: #e7e7e7;color: #222;font-family: "Lucida Sans Unicode", "Lucida Grande", sans-serif;font-size: 13pt;line-height: 19pt;}body, h1 {margin: 0;padding: 0;}hr {color: #bda;height: 2pt;margin: 1.5%;}h1 {color: #555;font-size: 14pt;}ol {padding-left: 2.5%;}ol li {padding-bottom: 13pt;}small {color: #555;font-size: 11pt;}ul {list-style-type: none;margin: 0;padding: 0;}.button {color: #04a;cursor: pointer;}.button:hover {text-decoration: underline;}.container {background-color: #fff;border: 2pt solid #c7c7c7;margin: 2.5%;min-width: 850px;padding: 2.5%;}.header {border-bottom: 2pt solid #c7c7c7;margin-bottom: 2.5%;padding-bottom: 2.5%;}.hr {background: #bda;display: block;height: 2pt;margin-top: 1.5%;margin-bottom: 1.5%;overflow: hidden;width: 100%;}.info {background-color: #efe;border: 2pt solid #bda;display: inline-block;padding: 1.5%;text-align: center;}.updating {color: red;display: none;}#change_language {float: right;}#change_language, #texts div {display: none;}</style></head><body><div class="container"><div class="header"><a href="#" id="change_language" onclick="return changeLanguage();" title="English">&#9745; English</a><h1>CERBER RANSOMWARE</h1><small id="title">Instructions</small></div><div id="languages"><p>&#9745; Select your language</p><ul><li><a href="#" title="English" onclick="return showBlock('en');">English</a></li><li><a href="#" title="Arabic" onclick="return showBlock('ar');">العربية</a></li><li><a href="#" title="Chinese" onclick="return showBlock('zh');">中文</a></li><li><a href="#" title="Dutch" onclick="return showBlock('nl');">Nederlands</a></li><li><a href="#" title="French" onclick="return showBlock('fr');">Français</a></li><li><a href="#" title="German" onclick="return showBlock('de');">Deutsch</a></li><li><a href="#" title="Italian" onclick="return showBlock('it');">Italiano</a></li><li><a href="#" title="Japanese" onclick="return showBlock('ja');">日本語</a></li><li><a href="#" title="Korean" onclick="return showBlock('ko');">한국어</a></li><li><a href="#" title="Polish" onclick="return showBlock('pl');">Polski</a></li><li><a href="#" title="Portuguese" onclick="return showBlock('pt');">Português</a></li><li><a href="#" title="Spanish" onclick="return showBlock('es');">Español</a></li><li><a href="#" title="Turkish" onclick="return showBlock('tr');">Türkçe</a></li></ul></div><div id="texts"><div id="en"><p>Can't you find the necessary files?<br>Is the content of your files not readable?</p><p>It is normal because the files' names and the data in your files have been encrypted by "Cerber&nbsp;Ransomware".</p><p>It means your files are NOT damaged! Your files are modified only. This modification is reversible.<br>From now it is not possible to use your files until they will be decrypted.</p><p>The only way to decrypt your files safely is to buy the special decryption software "Cerber&nbsp;Decryptor".</p><p>Any attempts to restore your files with the third-party software will be fatal for your files!</p><hr><p>You can proceed with purchasing of the decryption software at your personal page:</p><p><span class="info"><span class="updating">Please wait...</span><a id="megaurl" class="url" href="http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD</a></span></p><p>If this page cannot be opened &nbsp;<span class="button" onclick="return updateUrl();">click here</span>&nbsp; to generate a new address to your personal page.</p><p>At this page you will receive the complete instructions how to buy the decryption software for restoring all your files.</p><p>Also at this page you will be able to restore any one file for free to be sure "Cerber&nbsp;Decryptor" will help you.</p><hr><p>If your personal page is not available for a long period there is another way to open your personal page - installation and use of Tor&nbsp;Browser:</p><ol><li>run your Internet browser (if you do not know what it is run the Internet&nbsp;Explorer);</li><li>enter or copy the address <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> into the address bar of your browser and press ENTER;</li><li>wait for the site loading;</li><li>on the site you will be offered to download Tor&nbsp;Browser; download and run it, follow the installation instructions, wait until the installation is completed;</li><li>run Tor&nbsp;Browser;</li><li>connect with the button "Connect" (if you use the English version);</li><li>a normal Internet browser window will be opened after the initialization;</li><li>type or copy the address <br><span class="info">http://lfdachijzuwx4bc4.onion/B3D1-6F32-2417-0446-88AD</span><br> in this browser address bar;</li><li>press ENTER;</li><li>the site should be loaded; if for some reason the site is not loading wait for a moment and try again.</li></ol><p>If you have any problems during installation or use of Tor&nbsp;Browser, please, visit <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> and type request in the search bar "Install Tor&nbsp;Browser Windows" and you will find a lot of training videos about Tor&nbsp;Browser installation and use.</p><hr><p><strong>Additional information:</strong></p><p>You will find the instructions ("*.hta") for restoring your files in any folder with your encrypted files.</p><p>The instructions ("*.hta") in the folders with your encrypted files are not viruses, the instructions ("*.hta") will help you to decrypt your files.</p><p>Remember the worst situation already happened and now the future of your files depends on your determination and speed of your actions.</p></div><div id="ar" style="direction: rtl;"><p>لا يمكنك العثور على الملفات الضرورية؟<br>هل محتوى الملفات غير قابل للقراءة؟</p><p>هذا أمر طبيعي لأن أسماء الملفات والبيانات في الملفات قد تم تشفيرها بواسطة "Cerber&nbsp;Ransomware".</p><p>وهذا يعني أن الملفات الخاصة بك ليست تالفة! فقد تم تعديل ملفاتك فقط. ويمكن التراجع عن هذا.<br>ومن الآن فإنه لا يكن استخدام الملفات الخاصة بك حتى يتم فك تشفيرها.</p><p>الطريقة الوحيدة لفك تشفير ملفاتك بأمان هو أن تشتري برنامج فك التشفير المتخصص "Cerber&nbsp;Decryptor".</p><p>إن أية محاولات لاستعادة الملفات الخاصة بك بواسطة برامج من طرف ثالث سوف تكون مدمرة لملفاتك!</p><hr><p>يمكنك الشروع في شراء برنامج فك التشفير من صفحتك الشخصية:</p><p><span class="info"><span class="updating">أرجو الإنتظار...</span><a class="url" href="http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD</a></span></p><p>في حالة تعذر فتح هذه الصفحة &nbsp;<span class="button" onclick="return updateUrl();">انقر هنا</span>&nbsp; لإنشاء عنوان جديد لصفحتك الشخصية.</p><p>في هذه الصفحة سوف تتلقى تعليمات كاملة حول كيفية شراء برنامج فك التشفير لاستعادة جميع الملفات الخاصة بك.</p><p>في هذه الصفحة أيضًا سوف تتمكن من استعادة ملف واحد بشكل مجاني للتأكد من أن "Cerber&nbsp;Decryptor" سوف يساعدك.</p><hr><p>إذا كانت صفحتك الشخصية غير متاحة لفترة طويلة فإن ثمّة طريقة أخرى لفتح صفحتك الشخصية - تحميل واستخدام متصفح Tor:</p><ol><li>قم بتشغيل متصفح الإنترنت الخاص بك (إذا كنت لا تعرف ما هو قم بتشغيل إنترنت إكسبلورر);</li><li>قم بكتابة أو نسخ العنوان <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> إلى شريط العنوان في المستعرض الخاص بك ثم اضغط ENTER;</li><li>انتظر لتحميل الموقع;</li><li>سوف يعرض عليك الموقع تحميل متصفح Tor. قم بتحميله وتشغيله، واتبع تعليمات التثبيت، وانتظر حتى اكتمال التثبيت;</li><li>قم بتشغيل متصفح Tor;</li><li>اضغط على الزر "Connect" (إذا كنت تستخدم النسخة الإنجليزية);</li><li>سوف تُفتح نافذة متصفح الإنترنت العادي بعد البدء;</li><li>قم بكتابة أو نسخ العنوان <br><span class="info">http://lfdachijzuwx4bc4.onion/B3D1-6F32-2417-0446-88AD</span><br> في شريط العنوان في المتصفح;</li><li>اضغط ENTER;</li><li>يجب أن يتم تحميل الموقع؛ إذا لم يتم تحميل الموقع لأي سبب، انتظر للحظة وحاول مرة أخرى.</li></ol><p>إذا كان لديك أية مشكلات أثناء عملية التثبيت أو استخدام متصفح Tor، يُرجى زيارة <a href="https://www.youtube.com/results?search_query=Install+Tor+Browser+Windows" target="_blank">https://www.youtube.com</a> واكتب الطلب "install tor browser windows" أو "تثبيت نوافذ متصفح Tor" في شريط البحث، وسوف تجد الكثير من أشرطة الفيديو للتدريب حول تثبيت متصفح Tor واستخدامه.</p><hr><p><strong>معلومات إضافية:</strong></p><p>سوف تجد إرشادات استعادة الملفات الخاصة بك ("*.hta") في أي مجلد مع ملفاتك المشفرة.</p><p>الإرشادات ("*.hta") الموجودة في المجلدات مع ملفاتك المشفرة ليست فيروسات والإرشادات ("*.hta") سوف تساعدك على فك تشفير الملفات الخاصة بك.</p><p>تذكر أن أسوأ موقف قد حدث بالفعل، والآن مستقبل ملفاتك يعتمد على عزيمتك وسرعة الإجراءات الخاصة بك.</p></div><div id="zh"><p>您找不到所需的文件?<br>您文件的内容无法阅读?</p><p>这是正常的,因为您文件的文件名和数据已经被“Cerber&nbsp;Ransomware”加密了。</p><p>这意味着您的文件并没有损坏!您的文件只是被修改了,这个修改是可逆的,解密之前您无法使用您的文件。</p><p>安全解密您文件的唯一方式是购买特别的解密软件“Cerber&nbsp;Decryptor”。</p><p>任何使用第三方软件恢复您文件的方式对您的文件来说都将是致命的!</p><hr><p>您可以在您的个人页面上购买解密软件:</p><p><span class="info"><span class="updating">请稍候...</span><a class="url" href="http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD</a></span></p><p>如果这个页面无法打开,请 <span class="button" onclick="return updateUrl();">点击这里</span> 生成您个人页面的新地址。</p><p>您将在这个页面上看到如何购买解密软件以恢复您的文件。</p><p>您可以在这个页面使用“Cerber&nbsp;Decryptor”免费恢复任何文件。</p><hr><p>如果您的个人页面长期不可用,有其他方法可以打开您的个人页面 - 安装并使用 Tor 浏览器:</p><ol><li>使用您的上网浏览器(如果您不知道使用 Internet&nbsp;Explorer 的话);</li><li>在浏览器的地址栏输入或复制地址 <a href="https://www.torproject.org/download/download-easy.html.en" target="_blank">https://www.torproject.org/download/download-easy.html.en</a> 并按 ENTER 键;</li><li>等待站点加载;</li><li>您将在站点上下载 Tor 浏览器;下载并运行它,按照安装指南进行操作,等待直至安装完成;</li><li>运行 Tor 浏览器;</li><li>使用“Connect”按钮进行连接(如果您使用英文版);</li><li>初始化之后将打开正常的上网浏览器窗口;</li><li>在浏览器地址栏中输入或复制地址 <br><span class="info">http://lfdachijzuwx4bc4.onion/B3D1-6F32-2417-0446-88AD</span><br></li><li>按 ENTER 键;</li><li>该站点将加载;如果由于某些原因等待一会儿后没有加载,请重试。</li></ol><p>如果在安装期间或使用 Tor 浏览器期间有任何问题,请访问 <a href="https://www.baidu.com/s?wd=%E6%80%8E%E4%B9%88%E5%AE%89%E8%A3%85%20tor%20%E6%B5%8F%E8%A7%88%E5%99%A8" target="_blank">https://www.baidu.com</a> 并在搜索栏中输入“怎么安装 Tor 浏览器”,您将找到有关如何安装洋葱 Tor 浏览器的说明和教程。</p><hr><p><strong>附加信息:</strong></p><p>您将在任何带有加密文件的文件夹中找到恢复您文件(“*.hta”)的说明。</p><p>带有加密文件的文件夹中的(“*.hta”)说明不是病毒,(“*.hta”)说明将帮助您解密您的文件。</p><p>请记住,最坏的情况都发生过了,您的文件还能不能用取决于您的决定和反应速度。</p></div><div id="nl"><p>Kunt u de nodige files niet vinden?<br>Is de inhoud van uw bestanden niet leesbaar?</p><p>Het is gewoonlijk omdat de bestandsnamen en de gegevens in uw bestanden zijn versleuteld door “Cerber&nbsp;Ransomware”.</p><p>Het betekent dat uw bestanden NIET beschadigd zijn! Uw bestanden zijn alleen gewijzigd. Deze wijziging is omkeerbaar. Vanaf nu is het niet mogelijk uw bestanden te gebruiken totdat ze ontsleuteld zijn.</p><p>De enige manier om uw bestanden veilig te ontsleutelen is door de speciale ontsleutel-software “Cerber&nbsp;Decryptor” te kopen.</p><p>Elke poging om uw bestanden te herstellen met software van een derde partij zal fataal zijn voor uw bestanden!</p><hr><p>U kunt op uw persoonlijke pagina de ontsleutel-software kopen:</p><p><span class="info"><span class="updating">Even geduld aub...</span><a class="url" href="http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.s7jadj.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.2eu9zl.bid/B3D1-6F32-2417-0446-88AD</a><span class="hr"></span><a href="http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD" target="_blank">http://lfdachijzuwx4bc4.onion.to/B3D1-6F32-2417-0446-88AD</a></span></p><p>Als deze pagina niet geopend kan worden &nbsp;<span class="button" onclick="return updateUrl();">klik dan hier</span>&nbsp; om een nieuw adres aan uw persoonlijke pagina toe te voegen.</p><p>Op deze pagina zult u de complete instructies ontvangen hoe u de

Signatures

  • Cerber

    Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.

  • Deletes shadow copies 3 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Contacts a large (513) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 13 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 3 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"
      2⤵
      • Sets desktop wallpaper using registry
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\system32\wbem\WMIC.exe
          C:\Windows\system32\wbem\wmic.exe shadowcopy delete
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2108
      • C:\Windows\SysWOW64\mshta.exe
        "C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\AppData\Local\Temp\README.hta"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:568
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        3⤵
        • Deletes itself
        PID:2300
        • C:\Windows\system32\taskkill.exe
          taskkill /f /im "ad795aebd3065a1b1afd33df18590758_JaffaCakes118.exe"
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1536
        • C:\Windows\system32\PING.EXE
          ping -n 1 127.0.0.1
          4⤵
          • Runs ping.exe
          PID:1488
  • C:\Windows\eHome\ehshell.exe
    "C:\Windows\eHome\ehshell.exe" /prefetch:1003 "C:\Users\Admin\Desktop\TraceFind.DVR"
    1⤵
    • Drops file in Windows directory
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
      "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" /SkipFUE /RemoteOCXLaunch /SuppressDialogs
      2⤵
      • Enumerates connected drives
      • Modifies registry class
      PID:1252
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2096
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{3F6B5E16-092A-41ED-930B-0B4125D91D4E}
    1⤵
      PID:2948
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe"
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe"
        2⤵
        • Checks processor information in registry
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:2804
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.0.473003276\1654775878" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a9cdd378-399f-44ae-b5f3-ec9bd4d546f4} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 1284 f5f3b58 gpu
          3⤵
            PID:2128
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.1.1156993599\2082541690" -parentBuildID 20221007134813 -prefsHandle 1476 -prefMapHandle 1472 -prefsLen 20928 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9a77277-7756-4574-b61f-cdde8dd9bb5a} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 1488 d6fb58 socket
            3⤵
            • Checks processor information in registry
            PID:320
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.2.518603875\1709033147" -childID 1 -isForBrowser -prefsHandle 2156 -prefMapHandle 2172 -prefsLen 21031 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3864ecdc-6dd3-45c4-b3a7-ff9584ac05e4} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 2148 19d96758 tab
            3⤵
              PID:1400
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.3.1196241485\1683367938" -childID 2 -isForBrowser -prefsHandle 2376 -prefMapHandle 2500 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b83e29f7-b6df-404d-a461-28325fbbef5d} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 2504 d2d558 tab
              3⤵
                PID:1488
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.4.1511613595\1184072352" -childID 3 -isForBrowser -prefsHandle 2960 -prefMapHandle 2956 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {01e46b56-d3fc-4017-a387-7d2c52192eec} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 2972 1bb3c858 tab
                3⤵
                  PID:1352
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.5.1025570212\216771737" -childID 4 -isForBrowser -prefsHandle 1104 -prefMapHandle 3736 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d809209-42fa-4f9d-a0e4-4e5df478e0bb} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 3740 1dee0758 tab
                  3⤵
                    PID:1736
                  • C:\Program Files\Mozilla Firefox\firefox.exe
                    "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.6.1643652483\1243279262" -childID 5 -isForBrowser -prefsHandle 3860 -prefMapHandle 3864 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebc4fc55-9928-444b-8d6b-736c1b296086} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 3848 1e39b558 tab
                    3⤵
                      PID:628
                    • C:\Program Files\Mozilla Firefox\firefox.exe
                      "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2804.7.56588195\1647799595" -childID 6 -isForBrowser -prefsHandle 4036 -prefMapHandle 4040 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 836 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6180cc29-4b4e-47de-9e60-dc974f4cd00a} 2804 "\\.\pipe\gecko-crash-server-pipe.2804" 4024 1e39be58 tab
                      3⤵
                        PID:1764

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\uu0g08su.default-release\activity-stream.discovery_stream.json.tmp

                    Filesize

                    23KB

                    MD5

                    c6ab50b8d99bfdfc4334f5487b38604e

                    SHA1

                    922d6eb3a43d8828578f7ca223972ab7ba6b2cc4

                    SHA256

                    81a3489c6dd724ae4c5b111114ea3eec3f47aebf461c01bfa9e2ee4f63bb0164

                    SHA512

                    c4bd36875c9c88b369c883d8450c727e0803946a69330d4e786959c69ecd98fe0485aae27b58497ab35020b65909d72d533c2917a88316862e9121e536b81178

                  • C:\Users\Admin\AppData\Roaming\Addendum.H

                    Filesize

                    189KB

                    MD5

                    79382b8ded97b3c296d13ec3174627c4

                    SHA1

                    0941ac3bcf63768986fc247587edf7b93ff14137

                    SHA256

                    98d3bbb508f1e7dc27acc7820f91b6dfb4602bedaa76da8bca49ad33150524db

                    SHA512

                    76eee44a156dc7183febf03978df9f378a2cbb873f5f70c9ed034dd78d07bae0ada72f022c1d07e9b828a9d14eeff7be994ecb77380ae91180ced57621a6eb5a

                  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\74d7f43c1561fc1e.customDestinations-ms~RFf76c497.TMP

                    Filesize

                    1KB

                    MD5

                    ae2739fde2c42f6fa5badbf0eabe38d1

                    SHA1

                    9de062452e02a463e51c127f9d933abc343e6a1d

                    SHA256

                    cb7a7da5b72099ec071a5320d72a41ae45e18b6f8825f6891dc3596410acf285

                    SHA512

                    28e1dbfc7efbe9e695c45c8d10c156ccbf927620738ef261bd908e290f993c98c6fcec00cd5e0784ce4608c214475b778e43239bd3dd0fffac90b2cbf537fd52

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uu0g08su.default-release\datareporting\glean\db\data.safe.bin

                    Filesize

                    2KB

                    MD5

                    4aef4bab38a37d4d8bdc66fd4102b723

                    SHA1

                    7933c354b20b6667c45430c1360afc27f3b93500

                    SHA256

                    3eb6d79c06f0be9c3460130d192dfb3f4e68d28e1bf3c87e9e93ec926d914bb3

                    SHA512

                    92f271d2df185a9655cb9250d3b5d7f22d429dd553684af6971ce428bf1ba10a7da6215d81904ec7d7fda004ac4021f6d57df44e40f9482292580bffbec94f01

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uu0g08su.default-release\datareporting\glean\pending_pings\dc942a18-bb71-42e7-9049-b7ff48ba7651

                    Filesize

                    12KB

                    MD5

                    24b58ced909f90fe49f856a162081b15

                    SHA1

                    d0b975fb70cd46f5d0d6f4568b3b38a00cbff9cd

                    SHA256

                    2b1b1980185fdd91d48c0f7a36953db0c419ffecad79e4d9c321ab99a4e213e1

                    SHA512

                    e6f16db4dfc92e6ab6b7a2b9dd4d0978091a22aca5410b8ed1b4b21db1ddb5830a97bcbdad4a37a836bf2ecdef922a5259f5f4b28948da07d92809e320e250ee

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uu0g08su.default-release\datareporting\glean\pending_pings\df22f1fa-dee3-498c-9208-dc20bf646c0c

                    Filesize

                    745B

                    MD5

                    f657dd22c117c37449ff28970255a9b1

                    SHA1

                    de05195a424782ca0f800b652dbc48fbf740a596

                    SHA256

                    b61e4f184eab38cf70c9013ad502cb6cf3d5911d15df445f9aa78e4ffe8eae62

                    SHA512

                    56b7c8a15305477e18dc185bd04945e01aacc52dff5bafa8a3c2f32c20cfe0a46321de9dc49716de2af2d04a3c1bc12c62fbc6161cb0610027bfe63e2f605ffc

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uu0g08su.default-release\prefs-1.js

                    Filesize

                    6KB

                    MD5

                    64b66ef0032f2b98f275a590c0bce554

                    SHA1

                    50d81c8efb6a32e1fe3c64ee9d5c55a5c81399a9

                    SHA256

                    438fe4c043d0c4da380e80197b7bc5fdf88aeda9f2c19786d0b14003b4b63805

                    SHA512

                    40a27a5646e653ec5bca5a087f58fb5e8e34d3b95606f6066c058374a734db29a8253a6299c6e7bd2573a50275979e857b58f1d0e8658d9c24a626a0d6f28d41

                  • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\uu0g08su.default-release\sessionstore.jsonlz4

                    Filesize

                    924B

                    MD5

                    daeef6072ed28466070478edce8bf614

                    SHA1

                    1e80e301d94d7d0c32075ffd7935ed62e8af146a

                    SHA256

                    e2d18ce580573e1a4673c348b83d260a4cb0dab15c5288d97635897ea6afc23a

                    SHA512

                    173d7fe8699fdf092dcf9d29179ac827018c3f88410f9c3a6917c3cd6a34ddf78c1e5178f21950651d42f7dd82919b638997e52626f2e6b757bbc586408095c4

                  • C:\Users\Admin\AppData\Roaming\article.appendix.title.properties.xml

                    Filesize

                    1KB

                    MD5

                    adb1a285a2b926f98c062fbb74e1e992

                    SHA1

                    1f9799a61072673042a1a3da0fdf3fa93cf10f90

                    SHA256

                    4ba4637bffa741ba5619c3de97b6c209b5a9deb330385efc7a588492a98b7b45

                    SHA512

                    aa65628e34601645dfcdcb1f5f0347ae84555bd1a99432d4c25a50044dae932385bfa1f50551f6577d184de684f9264743facb53f4aa2e46bdfeff5c85bc6bd7

                  • C:\Users\Admin\AppData\Roaming\btn-next-static.png

                    Filesize

                    3KB

                    MD5

                    20418349e7f8244ea53bc174b2ff9576

                    SHA1

                    edb9087b6d85247ea0cad0060f540b0f890a80e1

                    SHA256

                    35d36d6619e249e8bf4838098fd1770c78617e3019162aaca092f8fa37c82dcb

                    SHA512

                    b12946ca17bb23403e106d561ae42d15695efde73eb4efb4099b57824c7ba0d2e331850022405f1d5da9502b568a217c06f259600cbbacc0d1c2b7210b31081f

                  • C:\Users\Admin\Documents\README.hta

                    Filesize

                    61KB

                    MD5

                    a3a76e68129ebaa9ae7ad1a0db8b58d3

                    SHA1

                    fff29bca3722b26bf09f5485ce786a240bb4d619

                    SHA256

                    c9dd4203e4eb5736a453923e51e4d034d459fc08efd2aaa617ae0fb80a273519

                    SHA512

                    3ff713860d9e4f4c740d97f78c6fb9adf80071af3e21cc8da80a2b687b60e1db23d806d1662f05bfe072694b36dceb88f7d1d615623e68c50a959472b3b89dcc

                  • \Users\Admin\AppData\Local\Temp\nsd2D0A.tmp\System.dll

                    Filesize

                    11KB

                    MD5

                    a436db0c473a087eb61ff5c53c34ba27

                    SHA1

                    65ea67e424e75f5065132b539c8b2eda88aa0506

                    SHA256

                    75ed40311875312617d6711baed0be29fcaee71031ca27a8d308a72b15a51e49

                    SHA512

                    908f46a855480af6eacb2fb64de0e60b1e04bbb10b23992e2cf38a4cbebdcd7d3928c4c022d7ad9f7479265a8f426b93eef580afec95570e654c360d62f5e08d

                  • \Users\Admin\AppData\Roaming\NsResize.dll

                    Filesize

                    28KB

                    MD5

                    d53bd2d5591a78ea15b3bd59e2652bd6

                    SHA1

                    40968bcae13ee63469d241200679b25dfa5fdd4c

                    SHA256

                    1734bceb77dab6739b80575fd7ee87c437327d8eb147339e1d93b7d3235c5394

                    SHA512

                    c07bbab95251f16ac4b1c03e0324792b35badd111cced2e5c8e0de467226e572edfe5ca6e528c3494664f2569774f6a422806f54883cc2ef3726e21f4a011f5b

                  • memory/2736-417-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-423-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-46-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-621-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-21-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-49-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-23-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-27-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-25-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-33-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-31-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                    Filesize

                    4KB

                  • memory/2736-437-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-74-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-73-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-38-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-37-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-36-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-431-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-384-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-387-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-390-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-393-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-396-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-399-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-402-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-405-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-408-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-411-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-414-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-29-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-420-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-429-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2736-426-0x0000000000400000-0x0000000000431000-memory.dmp

                    Filesize

                    196KB

                  • memory/2824-41-0x000000001E7E0000-0x000000001E964000-memory.dmp

                    Filesize

                    1.5MB

                  • memory/2824-34-0x0000000002370000-0x00000000023F0000-memory.dmp

                    Filesize

                    512KB

                  • memory/2824-70-0x0000000002370000-0x00000000023F0000-memory.dmp

                    Filesize

                    512KB

                  • memory/2824-65-0x000000001BA10000-0x000000001BA1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2824-66-0x000000001BA10000-0x000000001BA1A000-memory.dmp

                    Filesize

                    40KB

                  • memory/2824-64-0x000000001D0B0000-0x000000001D0E7000-memory.dmp

                    Filesize

                    220KB

                  • memory/2824-40-0x000000001E1D0000-0x000000001E7D8000-memory.dmp

                    Filesize

                    6.0MB

                  • memory/2824-53-0x0000000002370000-0x00000000023F0000-memory.dmp

                    Filesize

                    512KB

                  • memory/2824-48-0x000000001F1F0000-0x000000001F2A8000-memory.dmp

                    Filesize

                    736KB

                  • memory/2824-47-0x000000001EFB0000-0x000000001F04E000-memory.dmp

                    Filesize

                    632KB