Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 17:03
Static task
static1
Behavioral task
behavioral1
Sample
e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe
Resource
win7-20240705-en
General
-
Target
e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe
-
Size
1.9MB
-
MD5
f6dca815eb37c8aa9ba54c603624227b
-
SHA1
4a2215c9b3d8125d176014d528be0563aef1979e
-
SHA256
e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d
-
SHA512
6df5f2608b88170c32258150689123de759694976bbfb063cd03ca646452bfd5ba97d3282db83e9f138f3885627df5437d2455765c3d93a28e860ec2972529ca
-
SSDEEP
24576:EbwZGWBF4JrhKAlbJm35/vewlxk52vrTmMbT1KALVQtGKDLltj7kXCUiE8lmEE3P:EGANKAlb0lv9YT8UGSL38XCD4EeAyr
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
sila
http://85.28.47.31
-
url_path
/5499d72b3a3e55be.php
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation 6fee5b1bc4.exe -
Executes dropped EXE 6 IoCs
pid Process 4700 explorti.exe 2232 7104005dcb.exe 1560 6fee5b1bc4.exe 316 explorti.exe 3908 explorti.exe 3820 explorti.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7104005dcb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000016001\\7104005dcb.exe" explorti.exe Set value (str) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6fee5b1bc4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000017001\\6fee5b1bc4.exe" explorti.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1560-403-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-419-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-427-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-428-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-769-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-1210-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2025-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2642-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2650-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2654-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2656-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2658-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2660-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe behavioral2/memory/1560-2670-0x0000000000F80000-0x0000000001A5A000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 19 IoCs
pid Process 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 4700 explorti.exe 1560 6fee5b1bc4.exe 316 explorti.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 3908 explorti.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 3820 explorti.exe 1560 6fee5b1bc4.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4500 2232 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7104005dcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fee5b1bc4.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 4700 explorti.exe 4700 explorti.exe 316 explorti.exe 316 explorti.exe 3908 explorti.exe 3908 explorti.exe 3820 explorti.exe 3820 explorti.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1844 firefox.exe Token: SeDebugPrivilege 1844 firefox.exe Token: SeDebugPrivilege 1844 firefox.exe Token: SeDebugPrivilege 1844 firefox.exe Token: SeDebugPrivilege 1844 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1844 firefox.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe 1560 6fee5b1bc4.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1560 6fee5b1bc4.exe 1844 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2692 wrote to memory of 4700 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 89 PID 2692 wrote to memory of 4700 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 89 PID 2692 wrote to memory of 4700 2692 e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe 89 PID 4700 wrote to memory of 2232 4700 explorti.exe 92 PID 4700 wrote to memory of 2232 4700 explorti.exe 92 PID 4700 wrote to memory of 2232 4700 explorti.exe 92 PID 4700 wrote to memory of 1560 4700 explorti.exe 94 PID 4700 wrote to memory of 1560 4700 explorti.exe 94 PID 4700 wrote to memory of 1560 4700 explorti.exe 94 PID 1560 wrote to memory of 2720 1560 6fee5b1bc4.exe 101 PID 1560 wrote to memory of 2720 1560 6fee5b1bc4.exe 101 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 2720 wrote to memory of 1844 2720 firefox.exe 103 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 PID 1844 wrote to memory of 3704 1844 firefox.exe 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe"C:\Users\Admin\AppData\Local\Temp\e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\1000016001\7104005dcb.exe"C:\Users\Admin\AppData\Local\Temp\1000016001\7104005dcb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 10124⤵
- Program crash
PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000017001\6fee5b1bc4.exe"C:\Users\Admin\AppData\Local\Temp\1000017001\6fee5b1bc4.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account4⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://www.youtube.com/account5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 25757 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7726dd04-0a82-4564-9469-ec3e9c78adc7} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" gpu6⤵PID:3704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 26677 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8bb69af8-bea4-4edc-9d81-36c018542925} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" socket6⤵PID:4684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2964 -childID 1 -isForBrowser -prefsHandle 2956 -prefMapHandle 2976 -prefsLen 22698 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2f1dd0c3-3c5c-4a14-b654-59ec948d316c} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" tab6⤵PID:2248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4116 -childID 2 -isForBrowser -prefsHandle 4108 -prefMapHandle 4104 -prefsLen 31167 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {41938ce4-735a-4573-a13a-1eb39164a230} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" tab6⤵PID:3264
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4940 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4808 -prefMapHandle 1588 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f2c3416-78d2-4300-bd6a-f36a80a61e3c} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" utility6⤵
- Checks processor information in registry
PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5372 -childID 3 -isForBrowser -prefsHandle 5424 -prefMapHandle 5420 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60cee34e-a7f7-499c-bf78-b920974020fd} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" tab6⤵PID:4416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5636 -childID 4 -isForBrowser -prefsHandle 5560 -prefMapHandle 5564 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9449fae9-a6ce-4ac4-987b-9de3743ff378} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" tab6⤵PID:4680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5820 -childID 5 -isForBrowser -prefsHandle 5612 -prefMapHandle 5560 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4595f8d1-96d3-41c4-9585-055265fa4d08} 1844 "\\.\pipe\gecko-crash-server-pipe.1844" tab6⤵PID:2432
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2232 -ip 22321⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:316
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3908
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\1l89xtkq.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5e1787b1d87c674ee85c3cdf7d7eabb38
SHA1a9c0294ebe7a4d0782f06c0e0ec60d08652d7273
SHA2569ea80012d8c3cabba633c1b1161d45a0140812176d0fca453908d18f8adc0967
SHA51297df751d5832291928a1aae6aab358961e4a98656dda19f02831fe07b3e9c19ec7417b67e57582e957238b54cc451e5f867db9f3909e60b9395def1fc6e40e85
-
Filesize
1.9MB
MD5f6dca815eb37c8aa9ba54c603624227b
SHA14a2215c9b3d8125d176014d528be0563aef1979e
SHA256e294f1b0ec3cff802aaa8be3fc47aa0c1a56cbdc644467503e5b30122954964d
SHA5126df5f2608b88170c32258150689123de759694976bbfb063cd03ca646452bfd5ba97d3282db83e9f138f3885627df5437d2455765c3d93a28e860ec2972529ca
-
Filesize
245KB
MD58cd9f617f145c5a958d7e2a8b14747a2
SHA182b3d3dd82a8793db937ad6a9a7db2dcc207c6d1
SHA256c945bc9c0ed048cc87a1e4398ab909d2522fa098d5159231d84946f4da4517df
SHA5124643ae00549ebb0f82833d51b5314a002f79068a30ffc75f2eca908f7c04ae9d6063083ba174be2260255dc5ee2418f74c90035550403cd51b252b3d9a2af1e8
-
Filesize
3.1MB
MD58eb8080595c09d49388ba0321720f4ca
SHA14c7ac7bbc67c3d3663db5d7a3a48288c366d65d9
SHA256677858310f9f4c8f6bac736ea1e0b87e08d58f270c479257b32089d408d4cb7a
SHA512b49c54fc38efce7940bd0b66381017f458f7252927ba07efced7ce619377513c4c5956bbe21781acab18dc76805d0b611fe004a6efba65d103a0c1b060f45e4c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\AlternateServices.bin
Filesize17KB
MD5fbc45f319198a18cbdc22f9749ff952b
SHA15240549b09802591b26d5d703f7bd2cfd3469f9f
SHA256e40d8b974f631bdba58299a303019b64a0eb28fc7b0e13867f8cb159c95186f2
SHA51296ed1ac4e651f8a2e46a7867df9d52f87c229a668b995a0c1fb5c6304fdcffe6ee13d8805e6b4a3d7579d7e34330559270c3cd5f564bb60310337f12cb3511a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\AlternateServices.bin
Filesize8KB
MD5b2c518305a9bbce5a5f5073fb20d0467
SHA1c9c57c67f7888c5c9f02564d1221c22addf8798c
SHA2563ffc55c0d017142c65abfbc6ae07953d973dd97d3a964f4f2fe593815970a22e
SHA5120998469ebbfb8bf31619300e04ed3e2880134df5e10b7a4d2f18ca4723873ea443a0a0213465038587879b045b8ac1eba54496f398c6004fb42b3fc05fcf3e7c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\AlternateServices.bin
Filesize12KB
MD501450e63a0babe0a2c8098fc5ebda13f
SHA16fa9347a726a7f5880910f6ede5a0efedb54f030
SHA2561ba12b948301e38eaefd4270900c5384a4b93488b95b6df9e86e3afd88870e6b
SHA51236d7db6b0a6427c9d4e08a1aae30655fb502401cd26534b2ff7effc1af4376710d76c986226358c4e99ec2fd895cbd2dbf8085dad09a5719eae469308be7642e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5474e6ad18f63420064b574d5106dca3d
SHA126fe5088f76173f59d759f8bb932694d13fa84e0
SHA256775010ef1d384665a6ba34031d3f4188d0333806065bedd1a685358fafa608c5
SHA512f5a6a6a591db91ca337c7881108e0f2b4028a28305749490232e93265c13fc857a2eba634a70a732e166c341780346587be56b0cf77b2782a94ec758dc8db94a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5be2aaa2c4870dafb41bb1cab129984e4
SHA1cf7fa4d6c80f82f5eedd4dda1d9aab468bcdedb7
SHA2561345c15052bde806eede3e76223329ee1b4a934b9dc395a9aba039a95c79d9a0
SHA512bbb0d8581a6de1dd54eddc1aef2b5934e75441204f0a66bf89261111dc4f794f2ac76661ab5b7bc4f8f1aa91dd0382932f96837b0a2d58065a7ce4043ef73fe5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD589e7b85baec898c187ea7e8e0dbbeeff
SHA1d8740f0cf33d872fd864bf29f15ea2e07bcd73ea
SHA256dd2cad8e2f6ace24ca034d3149c2a9b4d141e3d2128b81940424e74e9cc44fe3
SHA512fe157880d899a9c1e2fa5704194e276ab1ed91ae51baefe6cc2ea5299b1caddd7aa20441fee9a1341eddb98dc9d1d4f95f7e7f115c5a859e326e7698c23da85a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\datareporting\glean\pending_pings\26a9df14-f14c-470b-b161-0d2e8e580178
Filesize28KB
MD58736cb8068fdf774e39c8dd519209b6d
SHA12be7e283828d1b7b2f8efee9c9ce75dd41ebeaa2
SHA2564322b0a726b51de3da57eff27c04ea99a73ffe8acad66dfbc79f1a9d538513d1
SHA5124d9975b27f9cad37c61c0f5c19016a91ba2fd70553f2820e60a811acd5b76bbc9c5b7d0b8a4401b2906c64536aa7ae411b8c79dbd94a1ca73db3f9f4a8b744fb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\datareporting\glean\pending_pings\827aa14a-fa43-479b-8acd-931ac4d3d919
Filesize671B
MD53dca9f4a9b4240966cb3b52a1e9666b1
SHA1b98484b41806ef3f356d36ff33d940332aa34a90
SHA256a8a44bc99cd31a8f3b2dc5cbc19251a2b683e7cb06c8b0e4ef29bcc1df903a42
SHA512db7aeff2537dd7a77612f52c77d12c0f3c7f8a8fab784a5d08c5a79c4c43f6eeaa4b8ea3e7b8de77eeb814d67e051c1638858b885076ce3c78e6d5542f60af67
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\datareporting\glean\pending_pings\85ab8ab9-247e-4f68-8cd5-225fb898dc65
Filesize982B
MD56a1f586a182c92d41e1c6e29ea544ecb
SHA190e8443ad4d2b91ed58f8e9ded75d7f3ed21c4d1
SHA2566e7dd34fd6bfeeeb15c19a1dde5d9298df3da7f78267db203018eec082a6baf8
SHA512236721ee1054ca48da216797b0271c0b81c4b71c5db2c1b4ac602570fdbbf5ff877084aaa4f67f6f8f8958b67b06fa941b983e7d63cc81d215481b9996907853
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
13KB
MD518889d46739157745c76b72ac5b557c6
SHA10f82845e729c91c71af191884e628accf6ff37b2
SHA2566eb5b106daa8e250c95259b8fafca91fbc7c94d150407b1eca03f6317169af05
SHA512df9a4d75fda8ca325e5dfd0f72530f41e90b0b9c629d3971b5777a1da0620882a6d919959e899ceaa3b28561c348d14f2d6d20b380ae973869c4a8ec0d814190
-
Filesize
11KB
MD5e9971f82213ebb9ab6326db2d7fe64c2
SHA18922944011ca53299fcad0bff4896b8a00525cc6
SHA256c1442f0337458166724d313aaf86a73e5216d6c68cbfe179f07a970dc2c59f6e
SHA512c4381a5e95129620cc1d707fdc0e8e596f832718e6d583d343dd65f08225f0ffabac79fdfdfdaedf1a1792ec55a853cbad8f5fc6684d6e8b4c3917ecf82093c6
-
Filesize
12KB
MD5d4adccdff198d3469257d053771b89ae
SHA164ad632b3b2b2a74250248dc53b3f153eaedbfc8
SHA2561c9cade82db6113a93e4fdafe0540facc1cdffd1d6fd736b7d439ff5a645541a
SHA5129ecfc104ebd1381f10040aa5b3c594f1cf40c952c4ce084b77ede347b5136452121e1ce623e967269a12155d23caea43bd63ff8f34d936e2e70e0ab831dda5e9
-
Filesize
8KB
MD562fc3d720a8b1a0c37bf1e853015db87
SHA15c4fae012fef8213df15d985736b386946dfbf17
SHA2561c0340a57be0e18619f65a5e280206957eb89cd16f629a4005aa500ec6811094
SHA5128667d60ca419c4aff6a0c4d43d7e66ae58d4b118402677b9aea429b659b6831084c30d777146c13d7d2532314d796e0e8ddc92bcb75baf383b16d86f4da9c068
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\1l89xtkq.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.4MB
MD5bda8eaabd792d3750da10018e11ad26b
SHA168b8f0ca7c71711cf81b85aa64e5f40832b531af
SHA25655d04c17c54df19a0476dbbbbcf39816260b26469b4b0a0e374be3d36f193903
SHA51273b05d3394848d1fe141078c0c7865e6b7cd91b39dc14ae0979d795b2fb5bb2f750448634e639b9fd9cebfeac41a86e08451a14617297f158f217a268f42df8d