Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 12:32
Static task
static1
Behavioral task
behavioral1
Sample
b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe
Resource
win10v2004-20240709-en
General
-
Target
b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe
-
Size
1.8MB
-
MD5
3ffa502d38a0841f54f2bb96f34eda85
-
SHA1
d152f8ac6b6c1ecb8f80b77f2182e6e42e43b731
-
SHA256
b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d
-
SHA512
5a4896936a85baab8e322618683ac72091d968253f2cab2227c7126365c07ae9ce3f19ab3f0a4f1d690773d7ad702b70da786f68e0c60058d2d59dc2f08a6dca
-
SSDEEP
49152:jGgRd+om5zN3V9dOjDMxzZeCCWWDa+DhBsxVbeCee:jXRd+T71eTuaMe
Malware Config
Extracted
amadey
4.30
4dd39d
http://77.91.77.82
-
install_dir
ad40971b6b
-
install_file
explorti.exe
-
strings_key
a434973ad22def7137dbb5e059b7081e
-
url_paths
/Hun4Ko/index.php
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Control Panel\International\Geo\Nation 6632518a5f.exe -
Executes dropped EXE 7 IoCs
pid Process 3908 explorti.exe 4552 explorti.exe 1932 fa5175f8fd.exe 1412 6632518a5f.exe 636 explorti.exe 4888 explorti.exe 452 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fa5175f8fd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000021001\\fa5175f8fd.exe" explorti.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000234e3-48.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 3908 explorti.exe 636 explorti.exe 4888 explorti.exe 452 explorti.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3908 set thread context of 4552 3908 explorti.exe 91 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4816 1932 WerFault.exe 93 -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 3908 explorti.exe 3908 explorti.exe 636 explorti.exe 636 explorti.exe 4888 explorti.exe 4888 explorti.exe 452 explorti.exe 452 explorti.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2464 firefox.exe Token: SeDebugPrivilege 2464 firefox.exe Token: SeDebugPrivilege 2464 firefox.exe Token: SeDebugPrivilege 2464 firefox.exe Token: SeDebugPrivilege 2464 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 2464 firefox.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe 1412 6632518a5f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2464 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3908 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 86 PID 5080 wrote to memory of 3908 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 86 PID 5080 wrote to memory of 3908 5080 b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe 86 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 4552 3908 explorti.exe 91 PID 3908 wrote to memory of 1932 3908 explorti.exe 93 PID 3908 wrote to memory of 1932 3908 explorti.exe 93 PID 3908 wrote to memory of 1932 3908 explorti.exe 93 PID 3908 wrote to memory of 1412 3908 explorti.exe 94 PID 3908 wrote to memory of 1412 3908 explorti.exe 94 PID 3908 wrote to memory of 1412 3908 explorti.exe 94 PID 1412 wrote to memory of 3992 1412 6632518a5f.exe 99 PID 1412 wrote to memory of 3992 1412 6632518a5f.exe 99 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 3992 wrote to memory of 2464 3992 firefox.exe 101 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 PID 2464 wrote to memory of 776 2464 firefox.exe 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe"C:\Users\Admin\AppData\Local\Temp\b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe"3⤵
- Executes dropped EXE
PID:4552
-
-
C:\Users\Admin\AppData\Local\Temp\1000021001\fa5175f8fd.exe"C:\Users\Admin\AppData\Local\Temp\1000021001\fa5175f8fd.exe"3⤵
- Executes dropped EXE
PID:1932 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1932 -s 13044⤵
- Program crash
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000022001\6632518a5f.exe"C:\Users\Admin\AppData\Local\Temp\1000022001\6632518a5f.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account4⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1888 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b31e67b0-5a73-451e-bf9c-07670f19152b} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" gpu6⤵PID:776
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2368 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24529d83-3e81-42ba-9c63-70754882d53c} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" socket6⤵PID:2296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2764 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 2816 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {894157ba-ec66-43d5-8cd7-027494555831} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab6⤵PID:3092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3908 -childID 2 -isForBrowser -prefsHandle 3904 -prefMapHandle 3900 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {06b7337a-3868-4a82-abf3-97856cfd9e84} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab6⤵PID:536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4940 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4952 -prefMapHandle 4948 -prefsLen 31167 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8cd35d0a-4464-43bc-a3dd-67292dfbccd4} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" utility6⤵
- Checks processor information in registry
PID:5488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5148 -childID 3 -isForBrowser -prefsHandle 5584 -prefMapHandle 5608 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab56332b-f0ee-4b75-8346-b56240cb341b} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab6⤵PID:3232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4892 -childID 4 -isForBrowser -prefsHandle 5068 -prefMapHandle 5560 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bf6b936-6e63-460a-9d27-4ac2d085edad} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab6⤵PID:940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4892 -childID 5 -isForBrowser -prefsHandle 6004 -prefMapHandle 6000 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a38c39ca-06b6-4c8f-8c90-c728df013b1e} 2464 "\\.\pipe\gecko-crash-server-pipe.2464" tab6⤵PID:3976
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1932 -ip 19321⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:636
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
C:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exeC:\Users\Admin\AppData\Local\Temp\ad40971b6b\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:452
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ehv06adt.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD54cdeca7b5067dfedf37485bfdf8a8375
SHA108190835506742ab660ee0120d085e4b62ea14f3
SHA256cb0989f4a3400d4ece5158f777ef9d83f9a9210d4cfbb32534348c4fe5752b97
SHA512adda92d9f9d7726f8eb108070d5975f018de1edfcf6487bf211570f20a5ff7d1a66693d91208c4b2e60981c0bdd317c4a8a8f8613e8f3926499592bea150084d
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ehv06adt.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5205755779938ba663749a19695571a6c
SHA1760729ee41836e509eb05f4a8f6058042cec4192
SHA256fce9fd04770471ca6928dbf2ce04e69e474216c5f6eb0ca65caa0327ff2d8b78
SHA5121a2f76f6ae3906c80bb610dd77a48b5ad8543e6865144d45d0f38c1bd020a61a916a12b4f236d9b607587a7e911a830c94d28819cc3b3649730e227690eb654a
-
Filesize
318KB
MD5ad5a4fda39e5b6baab5f6fef2bee3730
SHA1a6773b310fd651152ca73f8c6b3be5a38fc71cdd
SHA256c2643566b7886f6c16bc19e6eb804a7791bc713ae18b27f0d7fca938ca8f6817
SHA51247354b4cb02b0b7ea8afff6661881022a2bb2d8feb83c756ec87b75bc3ab8f5874ff3508b824de8a187518d9ae320467b8c3575fa7f2e7fea1c8011d44430973
-
Filesize
1.2MB
MD52e22ffc35badd6a848a2ea4ecc37940d
SHA1e1a1b25dabc27b3cf54f6f01382c211d57c54453
SHA256512bb87747812fdd189fcc63fa6886866cb811fd0ae1a46ed52201886aeef902
SHA512f7bcf3434fac88fa9b46c086de0b978c342a2870a7e032a180fb930785ac9e7bb2fcecb20df245e3decf1be986fe53868621e5922c45ea95e4d27e1aa8cabf41
-
Filesize
1.8MB
MD53ffa502d38a0841f54f2bb96f34eda85
SHA1d152f8ac6b6c1ecb8f80b77f2182e6e42e43b731
SHA256b1b0763774471a8d19f6a72fc61c1360cdbbb795ce2a0cc1cb42b4147c227e2d
SHA5125a4896936a85baab8e322618683ac72091d968253f2cab2227c7126365c07ae9ce3f19ab3f0a4f1d690773d7ad702b70da786f68e0c60058d2d59dc2f08a6dca
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\AlternateServices.bin
Filesize10KB
MD58a9802f8d2920a4b937e940518ec743e
SHA17b682a393fca2710f47a9900e653f874722c7d89
SHA25601eade833ac882dbde5b8942a1d044082198a5a72100e1a036578df5767a938b
SHA5122a53145e7316fdd785697985f3024a929306f0292e90035cb71d06542b11ad5abda9e3416572135486f1e255fd1296f1e260dfe79b4e1d59b1f2006bbfa794f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD538cd8b9dd495623dd30245ba302be679
SHA1a9cde6d9d3c81393fa45e6a0ed8a5130383e1c3d
SHA2562d6971eecaa89cd658e25c74cae1b45c19acbbefe8f37227e59211895a815b8a
SHA512b49602aa92599f8478a899a43cb726b95ad2bb8817d49f11258119a729e1537be59cd6868da86511a3a9c96177b9e04c72a775ea61b0e94094645d3fbea97e5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5776e1b2b9fef191dba6e4119fed0b51b
SHA1c898383ab86ca78683dd1a1798540b1af00b85be
SHA256ef116269a91df85a529b335c682c932da02ce354ecb34cf408eb53672dfa2983
SHA512732666f546ea4f2db9f4eadcd09bc1fe22c9de959f5d2004f58796b532627518faa33ec03f7467522589737af2968197499c339baba60e5e779b79cc68926c34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD54be981a1df30bff0a24003dbfd33bb48
SHA1b40f4d6e76fa8932dfc202376d3fee4bf97fcd24
SHA2565423f40a6919cb9de2f86c4023a61394bd406920f7d77e4c8f9ba7f9c53f2e64
SHA512d77d0c1d653e2be15d4171a2360592cb837bc2970cb16c5592ff27419584abe8f26d04bbd980bdbcff0aff6367fbb2e587d6e58a024792d27b56f4f9ba208e42
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD544af285ead795dda43c029887c990f6f
SHA14fa32a09750a905d2ab217e0ddeaf4765a940790
SHA25621112eccf6cc249f25037c48fd2128e7091a81e584e4384b60cf78265091ca8e
SHA51256ed287115da77465d50cca7ac5399719414857c76910c3021b12881aa18cc4781a5060f87479c6e5198e3bf89db7766bcb8980c0f369cda19e813000dad12b8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\0779994a-88b1-4e56-8e49-07a4a6ba7cac
Filesize671B
MD5973e9c78143420586d06a2a1fd7c29d9
SHA1ecc737b9df40e3a660d6005ceac14f3f53341372
SHA256f23a4573ab8e2da5d1b7058f38050deca968414d225114397e93114871a43b78
SHA512d4309ddccd9e01f5148211b4c6f94c3a7ed2438da97e14c5d1178dad3cd208d42b596a3f71c2dfe46d62732bb2b209f41a784ef6b7f3ced3d878e7b436a75ee8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\3f4b8662-8f48-4674-845d-86b602196691
Filesize982B
MD523908e4c897d151e6197e0d3605187ce
SHA166f28c6b7d12263cee95973ee59feab3378d03bd
SHA256158fa6f105d6b186834c0c2d30fb8f04c01f21207ac96bd53b364d92baad0f5c
SHA5122c6bfc21a79224327f0227cd126e9c679930e5c45b79ebd045a0d2a0f8919abbdd82a74aad501a5049fbc49391f5ba89f19215b4336e1d8ccc0296dc714f8b63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\datareporting\glean\pending_pings\5422e990-2c0e-45bf-97f5-6ee36b0348b8
Filesize25KB
MD5a92dbb097c8065540ac024b939fc12fe
SHA1dd9d5254ff1422dc65d716ebc4571fcda072f0aa
SHA2562481c12d7c4c92d8b483ba0f1f2bb95f69ab9a105a6df3e34fbfd8b6fd6d1424
SHA512f7cc0545f7b9b9bd3546068a459aeaa782207492dfa83471dec5aa87753bb70177fab29f15b162bc3726910fb6228bf5a87ecb4265b104fbe926714d338eaea9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ehv06adt.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5edf23fea9fb3a5e908b64c6840d25736
SHA150d79c9fb317b2f25eb430ea8b0e5d5a24e200b9
SHA256f7915b1efb7fb3fbd9fc1a62788e019db7ba33ec8ade94c0412c87e466a4f415
SHA512ff593fa00838c675b5ead61a7c169d1a2dbf92c7450a177078e9f62b3f3547217f80c6bdd3f75b82232c7ee42d4ff81d862fac66f4930fcc61fe32014dcd4b55
-
Filesize
15KB
MD596bbbf724a7e6300a4dddebe9930d61f
SHA127952baf0fc66092c1205a8d67afa71005a9b7b7
SHA256b2d4911947092706d88f53651ef91ea1fae6aa33827acc5e7f7928b6051532bb
SHA5128dc8927cb4534d118a9d5ee8a1b3cbaeba7b359b9fdb80b2fd867764b1d28a614070825e68cf6f9e9d15af3e80432519aa2f11e61aa117150bad5921f1fabf28
-
Filesize
11KB
MD5b7005190abc0b64698575205b8be00f1
SHA1462386904fcfc044326da98cb44c03936979991d
SHA256a8c60914a8d0e3e6b6d70dc035db005ff568876a73e5a403ed254fdca98b6a72
SHA512bcc22606e4bde88aad062b746a049c4a3aab13eaa00034eb3e2a725772842c542e8b2588c4df04d10119c8f46b2ff627ac1982317ec7b3edae814f02e9b0c360
-
Filesize
12KB
MD52efca972181b769023d54453d8196db9
SHA13d0ad3465bbf93c9f2cd8bf060cd820ecf67af04
SHA25600f221d4557a7ea661e02d245653b6383c88d9097e30524a4ed6f1abbfce33bf
SHA512091807a51dff13335d03201cc2023164e6f5be19a695022589b8eb2a95374ca4bf121390751f8755ed285b5b5ae4f9536604459a47c1795d756e9cd4ba892504
-
Filesize
8KB
MD50d7395536d0f8af713e41548c61acdab
SHA18dcda2e2eee40bb0f824c374cc3febf583128deb
SHA2564f39ee6cc87077d36f65cd296d4e0cbe064d0d59bce89814f3ded3e486bd7333
SHA512c78fa0808e8546f07606fdfccef30df5532e7ac12e5f3de5053ccbe6ef1e4b390f91da9b3fe3ae1af78db3bcbe516d37030a3d961d2c6ab6089ca7308558b0a7