Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 16:25
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe
Resource
win7-20240704-en
General
-
Target
SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe
-
Size
1.8MB
-
MD5
246a2188eb95e0eda77ad4891c4dc765
-
SHA1
53401c4e4aaebcd6fa94c92798f346a0e023efd8
-
SHA256
ea3b2c23df3162a6fa5c9d22d03f50db30542d7570ef769ded4ef106fb0255f4
-
SHA512
8ec6d38687806a45a888ddf22614a5170b6e417594cd70f913280e3f7d8820c350925dd3c0d9167b26386dc8c67ec2191128ebc99e562ec64983393bd2872102
-
SSDEEP
49152:xQzhheXO8GGTS6B1CCZ4cwjPXI7NwP+Vl0:xQnwOpG2ce0YKl0
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation adaab0dc1d.exe Key value queried \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe -
Executes dropped EXE 5 IoCs
pid Process 2780 explorti.exe 1284 bc9a6e2130.exe 4360 adaab0dc1d.exe 5760 explorti.exe 3600 explorti.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Software\Wine SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe Key opened \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bc9a6e2130.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\bc9a6e2130.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\adaab0dc1d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000017001\\adaab0dc1d.exe" explorti.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4360-405-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-428-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-439-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-448-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-1096-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2107-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2573-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2581-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2584-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2589-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2591-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2593-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2595-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2602-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe behavioral2/memory/4360-2604-0x0000000000A00000-0x00000000014E7000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 2780 explorti.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 5760 explorti.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 3600 explorti.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4140 1284 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc9a6e2130.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adaab0dc1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-47134698-4092160662-1261813102-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 2780 explorti.exe 2780 explorti.exe 5760 explorti.exe 5760 explorti.exe 3600 explorti.exe 3600 explorti.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 5000 firefox.exe Token: SeDebugPrivilege 5000 firefox.exe Token: SeDebugPrivilege 5000 firefox.exe Token: SeDebugPrivilege 5000 firefox.exe Token: SeDebugPrivilege 5000 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 4360 adaab0dc1d.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 4360 adaab0dc1d.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 5000 firefox.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe 4360 adaab0dc1d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4360 adaab0dc1d.exe 5000 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 2780 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 87 PID 4520 wrote to memory of 2780 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 87 PID 4520 wrote to memory of 2780 4520 SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe 87 PID 2780 wrote to memory of 1284 2780 explorti.exe 88 PID 2780 wrote to memory of 1284 2780 explorti.exe 88 PID 2780 wrote to memory of 1284 2780 explorti.exe 88 PID 2780 wrote to memory of 4360 2780 explorti.exe 91 PID 2780 wrote to memory of 4360 2780 explorti.exe 91 PID 2780 wrote to memory of 4360 2780 explorti.exe 91 PID 4360 wrote to memory of 2528 4360 adaab0dc1d.exe 98 PID 4360 wrote to memory of 2528 4360 adaab0dc1d.exe 98 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 2528 wrote to memory of 5000 2528 firefox.exe 100 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 PID 5000 wrote to memory of 336 5000 firefox.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.11481.24626.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\1000016001\bc9a6e2130.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\bc9a6e2130.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 10124⤵
- Program crash
PID:4140
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\adaab0dc1d.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\adaab0dc1d.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account4⤵
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1952 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1872 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb4ebf47-82ea-4e33-b210-ac0069a5ab9f} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" gpu6⤵PID:336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2320 -parentBuildID 20240401114208 -prefsHandle 2308 -prefMapHandle 2304 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4803b35e-a56d-4927-ba45-ba8062f7ebfe} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" socket6⤵PID:4688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3208 -childID 1 -isForBrowser -prefsHandle 3232 -prefMapHandle 3256 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7afe4265-722f-428d-ade8-60515c16bae9} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab6⤵PID:2444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4152 -childID 2 -isForBrowser -prefsHandle 4144 -prefMapHandle 4140 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {562bacdc-3670-4cbb-a723-3827b5a21a73} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab6⤵PID:1956
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4648 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 2792 -prefMapHandle 4624 -prefsLen 31167 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99791b41-714d-4e5c-97f1-e364bdae40f9} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" utility6⤵
- Checks processor information in registry
PID:4420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5280 -childID 3 -isForBrowser -prefsHandle 5352 -prefMapHandle 3920 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c487b82e-c01f-4b24-8efb-630183b1c675} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab6⤵PID:3612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5472 -childID 4 -isForBrowser -prefsHandle 5560 -prefMapHandle 5348 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9911f44-1bc0-4026-ba98-036b6c292539} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab6⤵PID:4308
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5788 -childID 5 -isForBrowser -prefsHandle 5708 -prefMapHandle 5716 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {12e560d4-eaf9-4a8a-8095-580166411efb} 5000 "\\.\pipe\gecko-crash-server-pipe.5000" tab6⤵PID:1280
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 1284 -ip 12841⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5760
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3600
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD5ed8c88aaae80f58a644279cc86593fd4
SHA1e21bf2a8db61b3d1f2073a82e19b11a004175381
SHA256eecdf90d2abec1379b1a7b0d1068bf7d7321893c65d1fb6c49f3ddc25ab5c287
SHA512d9295f87688b35ddddd4f788afb915e1c6c0cf58d095e354121cbaf441ad7a5cff62eaa5ec7d269c5194a5f3f5bc66f4275ed86276af1351d0cbd5e0f0390d2e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5b60c45fc22874b872f791f737c2e33f1
SHA18e690b3c0b55728af9dd4ea37a3dcc429ae962fc
SHA256c75a0630824784c926c40bf05d4a3266081ff10433ae1f073c1bd0d9243b88ca
SHA51298ef7cab4dbde613470cf02c2121e0065e6c336c706c77544df5186d29cb1b87bd0e4e0592a141c8cf7cdc3d5a74c49e17932167b84ef001db8ef96c7c1f041c
-
Filesize
1.8MB
MD5246a2188eb95e0eda77ad4891c4dc765
SHA153401c4e4aaebcd6fa94c92798f346a0e023efd8
SHA256ea3b2c23df3162a6fa5c9d22d03f50db30542d7570ef769ded4ef106fb0255f4
SHA5128ec6d38687806a45a888ddf22614a5170b6e417594cd70f913280e3f7d8820c350925dd3c0d9167b26386dc8c67ec2191128ebc99e562ec64983393bd2872102
-
Filesize
245KB
MD58cd9f617f145c5a958d7e2a8b14747a2
SHA182b3d3dd82a8793db937ad6a9a7db2dcc207c6d1
SHA256c945bc9c0ed048cc87a1e4398ab909d2522fa098d5159231d84946f4da4517df
SHA5124643ae00549ebb0f82833d51b5314a002f79068a30ffc75f2eca908f7c04ae9d6063083ba174be2260255dc5ee2418f74c90035550403cd51b252b3d9a2af1e8
-
Filesize
3.1MB
MD526a5431275d0b2aa34b78e1ab9a6c8b8
SHA18ce2d2733e466763c74f565c2a127ea3f9b33e35
SHA256aa69329596cb4df132ad23654dcf9a6ae0100358d76664b9c08c174daf8ed3a8
SHA5123e6ce681f1a8fd4dc309de3f810dec7b3dd259a4c865d2d28d7051266e08659d4d2b26c12a36cc42eff7e507e3925882ac50c9fc62086d00bd5b123ce05580bd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\AlternateServices.bin
Filesize8KB
MD5ff9a5517d2bc0d11578407f9c17dc7ee
SHA192533bc5dfd0ea335d9714b9f4d6b8a03cd48801
SHA256d52e50f24f187fe49cb34ded981cf774bc0722509a3e8fefe21d2e8bd5886394
SHA5124e17aa8ee9ae6514d417616875d4032ac8263ae9315c6e2d82aeb02cfd1f9db971d67a3b2f4edfa8c352fb29e5ab3552d2ce7400efd9849544ffa567dbba79d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\AlternateServices.bin
Filesize15KB
MD5732f8becb36a443d318b99c9257ce4a4
SHA1e6abb695414d8b7019675cd8a7b82f9ce189641e
SHA256fc3d003b9759abd7021bc00b2f94abb59adc5f55c1d3ea5e45e195e2895bad31
SHA512e4eaba96583d349cc75de84c60e7c43551984832c39b64fbc608d774abd6822f094d035ae7403e27957b8c93aa975c348aff6568fb48a2d635bd77f72bc1c4e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp
Filesize3KB
MD5570f63ed3066db531c56a02e2655b14c
SHA14f2a92d11cfb4f63af9a34285f0bee7ebf4e728e
SHA25670aa66dbcb620f31ef5fc8a731dbd943bc31b8b7cda533dcc3a414e34d1e2cf4
SHA5125dd1b30166784b0460f482ee53d6db02f79973a6ce10f3a7009bf4fd72f41a8ce942b1981cd27454e07d374eb362d972e14bb24fe73de0fa87c89571672d49ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ef517df51a1e3df092dfaaa9b7d1a61c
SHA14b1c81e7619373a1b6f911bcb25159cbc4b39799
SHA256101eaec0453259781754476186790e8826d3bc7c68d38c6a3e4fd09cedb7ca89
SHA5129e653fea2671287ae1a41745e307722cb18d9d0dc7d5f1aff2f7ba9c7bc2b1e24761dfd5a41e57c04086b715237d7faf22957c610f9f781a5cd2cef1177e4785
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5275279d2583ab22b8f5140e1dda490ab
SHA1d8cd3d83bf6afd0e71acac8cc3b705050b8d56d4
SHA256c559f0a79b16ed6e414f49ae63b29ccddf3d98d3e85b13508794359ad8e6d1b8
SHA5122200bdc1504b2f6c282604dfaf3cc3332475f393cbd4b29333aedc62b455d702ee1356518262d22fc04f942a8a8551fcca2616662802dfee7cdb2d3f3b8e9660
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5faa0481dd33388980e39de58d82eb02e
SHA1b7656135fca44b033614465e9224d576cde793db
SHA2568761aeae4c27ab1417ccdb6916f53b7a219427bc1f4e448fabe01bc16f142af4
SHA5128bddb26bb196cf7d059de886e2cbc1d281199478af9850a0a07721772f95571668bce40e1a9b38c5befcbfb925bf23db5ab612078eef139e22ad498d1d4a9c69
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\pending_pings\983bf036-060e-4400-b860-8d3f49774ba8
Filesize982B
MD546eb8fe242dbcf5d4b740f44ede1feb0
SHA17978212f63fe36f564b3f79e11336ce7666442c0
SHA256b6b0a104e27976c772f54ab7b452904d4811e003e7342395cdb65b5cfd1f004d
SHA5123eadb6e0320948dad3eba2466dad93ff2d733ebfddccd8a61229516ad0f5a2f47a5479703c949d51e0ebb544c6b893d45fd10ee4e2dedc5229ea610bd80814cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\pending_pings\ad1ae03c-22a0-446e-8892-f5d5d7e321ac
Filesize27KB
MD598bc889673e4a1e64b7395560fd4ba45
SHA1d2e71455fa3c6ac1c5051320bf5a4fcfd063d6c9
SHA25615a8c762745fde3903c14c019fa8bc9cfc2c0a7c979411b1066b11584642617b
SHA5125451cdd24d8ce513bef778715ddef53df7c987881096efd9c2ad676c7bf4ed871eb527c5598ab23f4cea10d6886971e8740f67b99fba89b13c4bffb9b89b558c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\datareporting\glean\pending_pings\f63380dd-2c5b-4f6f-99ec-5031949c767b
Filesize671B
MD577c4f6b14ae6aac65086c8e05054bcd5
SHA16f70adb6998ef1333f7bb7a489ec6bf8daeadd0a
SHA256074fc673ed120ab7a945de0d694693b4ac7c527c4c7658d4557a80293cb3e577
SHA51229c6662df00d7bca410fbd815c11c2d20b2eacaebe3d82275f25d45f334e1a769ec7ca4e74ac2a05434595d1c5b88f7fbfba45432bbd6621b8f22a7a3f5ba1d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5b97a1d54b5879dcac14eef69d91caa83
SHA14f052c153d1182652b0d86628fa04e90846b52b6
SHA256cd679e227433264a986f1a6f00f356fcf723548bb53a00084d171ec12e7a287c
SHA512b9c0dbe23ca2c51dcbc81bc2e34d41126831b00341ca025225b6fdab29285e50ae777d4b5bd5982703848b580fb9df1925d4871f12588ee3df27aa41fe6c201a
-
Filesize
12KB
MD5d55a9550ee0b10cdf534f076bdc2f878
SHA1c81f2050a30b94b95ed538f0720d4ff0190f3f8b
SHA256a78fed522ec8c1d6816dd2534f63c2764390143ad918e22196b98a6d850f2598
SHA51292e79148efdb81c73834422078704fb1f44a7931aa15f1aed66d55f60538b836040c18ab45c142e155777fa95a33ca8bbd5da2f8844ca58eb8b62a9ab9ec27ab
-
Filesize
16KB
MD5bcd34f9ccf5cc603c511d4ecc3352b62
SHA1232bb2e04d3880843ae058e8aae789637513778b
SHA2564f5c8eda69f079b0d5ab51dbb8df23cee0c8ad8d8cc075f358ccdb1719c8d1d1
SHA5122ae8fbba144886b1296df1ccac13f6f5149a087525a6ce416046a83c8ae719fcc02df7ee4ea372540d0ffbbf5ef4e7ab6240bdb07ed03372de49c482f6b11005
-
Filesize
8KB
MD58ed6284653b03a1cd9536cbb7c3606c5
SHA19a60daf142a5262f38f663e26f48badbfb828530
SHA256de485f1f8a5685b865d2045608198438525a050c21b62d23b874834961446bd6
SHA5122da78489aba4109e058c3f3352a06cb1d6ecd54588af0bca7005e50bb02a8bfaaf614be9564df6704e2b7bda818897afad84e5c3924bf6985734ab5f9a95f6d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD51f2f694b2609c08d976db009e50bcec5
SHA187198aa5d649882e2a07f60f4be81dfeb9fa8581
SHA2568cafb6a209e3852a6b89a640775dca1becd36087a0f0d5939f81068f69f8a853
SHA5123535ab13036babbfd92fdd7273f60ba70b1a749b48394d42ec6b07b0437e84cd07caf237e18a905826918fa3d9752435a117a52de9fdc04e02bd840cb8b93b46
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5n0dnl6r.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.2MB
MD58233d64ce92711298dcab71276fa9e12
SHA1cb2063b1d531ce8988d6d579b77c16899dea6729
SHA256a65a9f74a8e5b94e8a5d208b03fb4e9cc25b4e94503545e79f0989f21a830f98
SHA51246fe5e3d0c39c46704420f45c6c10517931a300750a98f437b430ee69d01d05e97b19c223dd4ab0f3a5d3449f9d4eab828ed7b4df518d92493969520b88e8cf9