Resubmissions
06-08-2024 12:58
240806-p7wxwazcqq 1003-08-2024 17:38
240803-v77x2azfqn 1030-07-2024 18:36
240730-w9akzssfmk 1028-07-2024 20:03
240728-ysq8hs1hkq 10Analysis
-
max time kernel
76s -
max time network
77s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
03-08-2024 17:38
Static task
static1
Behavioral task
behavioral1
Sample
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
Resource
win10-20240404-en
General
-
Target
20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll
-
Size
116KB
-
MD5
20ed7ed36e052a523030ae979e872793
-
SHA1
b686ea3f47c254082c584ee9d18d386af4e0c870
-
SHA256
bec5d4b9979a2094fe1062512ea2754b9ce573b879b25167fa8a4f52f350edc9
-
SHA512
7df169ae3bf9bf85205a7b5a4d5ed33aed897073dc003a7ef1eea529473fffe005b549bd72e9f098ed958c8a5232640dc12928413d0690a3b6692ffd0b32cb94
-
SSDEEP
1536:CPp8kFF4+utlznGEvCrUmUYwGOmpX2yaICS4Aa7APtwdRW4M/5qAO:8vnuGqfGOqVBP+dlt
Malware Config
Extracted
C:\Users\689ni-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/AA6F49EDD2A72117
http://decryptor.cc/AA6F49EDD2A72117
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: rundll32.exe File opened (read-only) \??\R: rundll32.exe File opened (read-only) \??\A: rundll32.exe File opened (read-only) \??\B: rundll32.exe File opened (read-only) \??\E: rundll32.exe File opened (read-only) \??\J: rundll32.exe File opened (read-only) \??\L: rundll32.exe File opened (read-only) \??\M: rundll32.exe File opened (read-only) \??\V: rundll32.exe File opened (read-only) \??\Z: rundll32.exe File opened (read-only) \??\K: rundll32.exe File opened (read-only) \??\Q: rundll32.exe File opened (read-only) \??\T: rundll32.exe File opened (read-only) \??\W: rundll32.exe File opened (read-only) \??\I: rundll32.exe File opened (read-only) \??\S: rundll32.exe File opened (read-only) \??\X: rundll32.exe File opened (read-only) \??\G: rundll32.exe File opened (read-only) \??\H: rundll32.exe File opened (read-only) \??\N: rundll32.exe File opened (read-only) \??\O: rundll32.exe File opened (read-only) \??\U: rundll32.exe File opened (read-only) \??\Y: rundll32.exe -
Drops file in Program Files directory 33 IoCs
description ioc Process File opened for modification \??\c:\program files\UndoSearch.mhtml rundll32.exe File created \??\c:\program files\689ni-readme.txt rundll32.exe File opened for modification \??\c:\program files\ConvertToWrite.M2V rundll32.exe File opened for modification \??\c:\program files\InstallComplete.au rundll32.exe File opened for modification \??\c:\program files\TestUnpublish.wmv rundll32.exe File opened for modification \??\c:\program files\CompareResolve.css rundll32.exe File opened for modification \??\c:\program files\MeasureAdd.aif rundll32.exe File opened for modification \??\c:\program files\TestPublish.xsl rundll32.exe File opened for modification \??\c:\program files\ReceiveUninstall.edrwx rundll32.exe File opened for modification \??\c:\program files\RegisterExport.ps1xml rundll32.exe File created \??\c:\program files (x86)\689ni-readme.txt rundll32.exe File opened for modification \??\c:\program files\CompleteEnable.midi rundll32.exe File opened for modification \??\c:\program files\FormatEnable.png rundll32.exe File opened for modification \??\c:\program files\MovePing.i64 rundll32.exe File opened for modification \??\c:\program files\SaveResize.mpeg rundll32.exe File opened for modification \??\c:\program files\ConfirmCompress.mp3 rundll32.exe File opened for modification \??\c:\program files\EnterJoin.mov rundll32.exe File opened for modification \??\c:\program files\JoinExport.mp4v rundll32.exe File opened for modification \??\c:\program files\TestUnlock.WTV rundll32.exe File opened for modification \??\c:\program files\ResetWrite.rmi rundll32.exe File opened for modification \??\c:\program files\UnblockAssert.m1v rundll32.exe File opened for modification \??\c:\program files\WriteStop.mpg rundll32.exe File opened for modification \??\c:\program files\CompleteRestore.mht rundll32.exe File opened for modification \??\c:\program files\CopyDisconnect.vsd rundll32.exe File opened for modification \??\c:\program files\EditDisconnect.rle rundll32.exe File opened for modification \??\c:\program files\ProtectRedo.vst rundll32.exe File opened for modification \??\c:\program files\CloseUnlock.m4v rundll32.exe File opened for modification \??\c:\program files\MountExpand.xps rundll32.exe File opened for modification \??\c:\program files\OpenUnregister.html rundll32.exe File opened for modification \??\c:\program files\WaitResize.otf rundll32.exe File opened for modification \??\c:\program files\CheckpointPop.potx rundll32.exe File opened for modification \??\c:\program files\UnprotectMeasure.xht rundll32.exe File opened for modification \??\c:\program files\WriteCompare.wps rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 11 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions\Cached PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\LowRegistry PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000\Software\Microsoft\Internet Explorer\LowRegistry\Shell Extensions PaintStudio.View.exe -
Modifies registry class 13 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings firefox.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "51200" PaintStudio.View.exe Set value (int) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CacheLimit = "1" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History PaintStudio.View.exe Set value (str) \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Content PaintStudio.View.exe Key created \REGISTRY\USER\S-1-5-21-3968772205-1713802336-1776639840-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.mspaint_8wekyb3d8bbwe\Internet Settings\Cache\Cookies PaintStudio.View.exe -
Suspicious behavior: AddClipboardFormatListener 4 IoCs
pid Process 2424 EXCEL.EXE 268 EXCEL.EXE 4292 vlc.exe 4176 PaintStudio.View.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2532 rundll32.exe 2532 rundll32.exe 4684 mspaint.exe 4684 mspaint.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4292 vlc.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2532 rundll32.exe Token: SeTakeOwnershipPrivilege 2532 rundll32.exe Token: SeBackupPrivilege 1976 vssvc.exe Token: SeRestorePrivilege 1976 vssvc.exe Token: SeAuditPrivilege 1976 vssvc.exe Token: SeDebugPrivilege 4176 PaintStudio.View.exe Token: SeDebugPrivilege 4176 PaintStudio.View.exe Token: SeDebugPrivilege 4176 PaintStudio.View.exe Token: SeDebugPrivilege 252 firefox.exe Token: SeDebugPrivilege 252 firefox.exe -
Suspicious use of FindShellTrayWindow 13 IoCs
pid Process 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 252 firefox.exe 252 firefox.exe 252 firefox.exe 252 firefox.exe -
Suspicious use of SendNotifyMessage 11 IoCs
pid Process 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 4292 vlc.exe 252 firefox.exe 252 firefox.exe 252 firefox.exe -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 2424 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 268 EXCEL.EXE 4292 vlc.exe 4684 mspaint.exe 4176 PaintStudio.View.exe 4176 PaintStudio.View.exe 252 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4140 wrote to memory of 2532 4140 rundll32.exe 73 PID 4140 wrote to memory of 2532 4140 rundll32.exe 73 PID 4140 wrote to memory of 2532 4140 rundll32.exe 73 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 4140 wrote to memory of 252 4140 firefox.exe 96 PID 252 wrote to memory of 2820 252 firefox.exe 97 PID 252 wrote to memory of 2820 252 firefox.exe 97 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 PID 252 wrote to memory of 4412 252 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\20ed7ed36e052a523030ae979e872793_JaffaCakes118.dll,#12⤵
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:4924
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\689ni-readme.txt1⤵PID:3612
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\UnlockCopy.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2424
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\UnlockCopy.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:268
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\SwitchEnable.au"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4292
-
C:\Windows\system32\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\Desktop\LockConfirm.jfif" /ForceBootstrapPaint3D1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4684
-
C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe"C:\Program Files\WindowsApps\Microsoft.MSPaint_1.1702.28017.0_x64__8wekyb3d8bbwe\PaintStudio.View.exe" -ServerName:Microsoft.MSPaint.AppX437q68k2qc2asvaagas2prv9tjej6ja9.mca1⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4176
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\689ni-readme.txt1⤵PID:368
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:252 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.0.1800900793\896745688" -parentBuildID 20221007134813 -prefsHandle 1720 -prefMapHandle 1716 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10e56594-3fe2-4e42-8434-10755c9968f9} 252 "\\.\pipe\gecko-crash-server-pipe.252" 1796 216276eee58 gpu3⤵PID:2820
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.1.613751245\325333039" -parentBuildID 20221007134813 -prefsHandle 2140 -prefMapHandle 2136 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {365fbb07-a9ee-4866-a768-b601c2720bd8} 252 "\\.\pipe\gecko-crash-server-pipe.252" 2152 2161c470d58 socket3⤵PID:4412
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.2.2038635415\1539915842" -childID 1 -isForBrowser -prefsHandle 2844 -prefMapHandle 2880 -prefsLen 20931 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b00866fe-e673-460b-b349-72d33532707c} 252 "\\.\pipe\gecko-crash-server-pipe.252" 2816 2162765ea58 tab3⤵PID:4964
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.3.1028826935\24858059" -childID 2 -isForBrowser -prefsHandle 3404 -prefMapHandle 3396 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf6dffa6-0063-4954-ab6b-983517c32702} 252 "\\.\pipe\gecko-crash-server-pipe.252" 3432 21629d90a58 tab3⤵PID:760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.4.291042117\220881302" -childID 3 -isForBrowser -prefsHandle 4020 -prefMapHandle 4016 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7ba3ebd-b5b8-4f1a-84f6-9b70e82821ea} 252 "\\.\pipe\gecko-crash-server-pipe.252" 4032 2162d565458 tab3⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.5.561858225\1469410186" -childID 4 -isForBrowser -prefsHandle 4976 -prefMapHandle 4980 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7bb8869e-5233-4ff5-a49b-ac108f4c4bbe} 252 "\\.\pipe\gecko-crash-server-pipe.252" 5080 2162acfbe58 tab3⤵PID:756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.6.1956400181\5350142" -childID 5 -isForBrowser -prefsHandle 4840 -prefMapHandle 4872 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {845710a0-32c6-42b6-a1d5-59c15594aa3b} 252 "\\.\pipe\gecko-crash-server-pipe.252" 5100 2162acfbb58 tab3⤵PID:2452
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.7.812568634\1827214013" -childID 6 -isForBrowser -prefsHandle 5276 -prefMapHandle 5280 -prefsLen 26168 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4af7d5f0-99a5-41c5-9a94-7a8beac493b3} 252 "\\.\pipe\gecko-crash-server-pipe.252" 5268 2162acfd358 tab3⤵PID:2212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.8.276352074\1793345314" -childID 7 -isForBrowser -prefsHandle 5136 -prefMapHandle 4596 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {613349ca-a786-4304-8d20-ef3759b09a64} 252 "\\.\pipe\gecko-crash-server-pipe.252" 5108 2162ebd5558 tab3⤵PID:5456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="252.9.1289981512\1274061254" -childID 8 -isForBrowser -prefsHandle 5152 -prefMapHandle 5136 -prefsLen 26249 -prefMapSize 233444 -jsInitHandle 1276 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {81c55504-4e52-45db-8d04-de9d8948792d} 252 "\\.\pipe\gecko-crash-server-pipe.252" 5916 2162f0db158 tab3⤵PID:5688
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD59a7d73ed239ed27bc40a96c82b4c867c
SHA1e94af9a570c92db9164b843e402ba0676ec6977b
SHA256cc8ecb64c02282362477005c01673a51db0a5d0475b2ab56a8012dae1dc56964
SHA51243a5361137e8c5fd93b0b28d10a4387e09d1b895c4c0b55410cd33656cde32ba8a754c9d55bb1751edc2c6dc66828d98df0eb6f9a2aa23b229804fbd968ce987
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize471B
MD57d4c4ae233eaa3d13c9d7720831f1e64
SHA1556a1c2e05fcadf4e0015a6a47e0ce33ab562146
SHA256ee68e521cc257eb3a395be61db55c9ec61617d9cf8f2efc833077933c37169bf
SHA51276a4a11e3a67baae92d65d64f85f0d163288a393942814a7a685302c29b6b5684d423b77e6d9fd2bfa1029930bd8e7f19f5cebfa1cb6217c9049bf6b105b7932
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD5352ed0699cf173788b55399db6618b6f
SHA1f347b7010b3ac32054909d8cc7242e0530696e54
SHA256bb45bbcc61582e79f5a1de49fa7b2585e5ed71e0bf7c93c5c287219e0317f699
SHA512728d68d90cb88a05d2be18b81ae299bb7a16274659d3d7d61d8743e3c009e469a3dec77f7fc30c99dc3fe2a75e138a8a6b6ba054d06b8cb5c31c9e43ba3b763e
-
Filesize
21B
MD5f1b59332b953b3c99b3c95a44249c0d2
SHA11b16a2ca32bf8481e18ff8b7365229b598908991
SHA256138e49660d259061d8152137abd8829acdfb78b69179890beb489fe3ffe23e0c
SHA5123c1f99ecc394df3741be875fbe8d95e249d1d9ac220805794a22caf81620d5fdd3cce19260d94c0829b3160b28a2b4042e46b56398e60f72134e49254e9679a4
-
Filesize
417B
MD5c56ff60fbd601e84edd5a0ff1010d584
SHA1342abb130dabeacde1d8ced806d67a3aef00a749
SHA256200e8cc8dd12e22c9720be73092eafb620435d4569dbdcdba9404ace2aa4343c
SHA512acd2054fddb33b55b58b870edd4eb6a3cdd3131dfe6139cb3d27054ac2b2a460694c9be9c2a1da0f85606e95e7f393cf16868b6c654e78a664799bc3418da86e
-
Filesize
87B
MD5e4e83f8123e9740b8aa3c3dfa77c1c04
SHA15281eae96efde7b0e16a1d977f005f0d3bd7aad0
SHA2566034f27b0823b2a6a76fe296e851939fd05324d0af9d55f249c79af118b0eb31
SHA512bd6b33fd2bbce4a46991bc0d877695d16f7e60b1959a0defc79b627e569e5c6cac7b4ad4e3e1d8389a08584602a51cf84d44cf247f03beb95f7d307fbba12bb9
-
Filesize
14B
MD56ca4960355e4951c72aa5f6364e459d5
SHA12fd90b4ec32804dff7a41b6e63c8b0a40b592113
SHA25688301f0b7e96132a2699a8bce47d120855c7f0a37054540019e3204d6bcbaba3
SHA5128544cd778717788b7484faf2001f463320a357db63cb72715c1395ef19d32eec4278bab07f15de3f4fed6af7e4f96c41908a0c45be94d5cdd8121877eccf310d
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\2D294DCB-86AD-4E65-9E9A-8B3C3EB70547
Filesize169KB
MD586a62f6d760b0ef46e0b34c2732c7cf1
SHA1f2a8868c308ad07cf17ed103750c9be54e299d39
SHA256ce246d0030f717f32b1ed44d469aa0866bc95b506ff4ac875a8a089b2ba2f651
SHA51229cefee31aa91f20489b363e6372982ef82fdbf218a2d4073b5036053455d8d7910a7c4886555b6c49ddb1167d4671ec4f570a9e2e4721ef4eaa5c66969edccc
-
Filesize
321KB
MD55b4ea7676f0e3aa19f87eaf81cacfc69
SHA1a776b52f53b1002255d87b4ced9f0d385d4f17ed
SHA2567e04d3b29ddaa7b7480f081db4d4f3b881e5945b40cd9a7582986603f8ceadaf
SHA5120a5cbf228584dd5b31b8d640f498ca1003683c571c5f77963b56dc7de6de3e8f5b161781f6d8344e2029816da2909cab293161265eac390646420def640c612b
-
Filesize
24KB
MD58665de22b67e46648a5a147c1ed296ca
SHA1b289a96fee9fa77dd8e045ae8fd161debd376f48
SHA256b5cbae5c48721295a51896f05abd4c9566be7941cda7b8c2aecb762e6e94425f
SHA512bb03ea9347d302abf3b6fece055cdae0ad2d7c074e8517f230a90233f628e5803928b9ba7ba79c343e58dacb3e7a6fc16b94690a5ab0c71303959654a18bb5da
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\74a0ad00a184813f0b8867eb2f8dfef7227a18a4.tbres
Filesize2KB
MD534bf999965875693204eb9f4c75f8b4b
SHA12c203077c4e2cf7a0b693f73590cb68b6a830074
SHA256093f0120ead9bf6c23b5f178db3d65d3b260e3ba3f1583dbd046db4bfa34be07
SHA5123072189bad791d729599a31337bba33ae411b35b64e7a594839dd06a837129c6f254e788bb37b29ae8f364d008eb53b07de347f5e6596be8e75d30a2ab455be9
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\Projects\Projects.json
Filesize233B
MD5d0e9b01e1eea1d666fd21efeae705279
SHA13f2cffeb1708f612dc1be576262e1c837785e9db
SHA256281c44006a10bb3a35d7ef7d6d9677d74bceaaafb536d11a8565df547e082343
SHA51278dea909fe527aed9f6e5e216439595007f17900c9946520cb5a864813a78e6812c4d47147b85835d706512c08cd56415bb6844caada20bb0d81f49fe334565f
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MSPaint_8wekyb3d8bbwe\LocalState\cloudCommunitySettings.json
Filesize2KB
MD5404a3ec24e3ebf45be65e77f75990825
SHA11e05647cf0a74cedfdeabfa3e8ee33b919780a61
SHA256cc45905af3aaa62601a69c748a06a2fa48eca3b28d44d8ec18764a7e8e4c3da2
SHA512a55382b72267375821b0a229d3529ed54cef0f295f550d1e95661bafccec606aa1cd72e059d37d78e7d2927ae72e2919941251d233152f5eeb32ffdfc96023e5
-
Filesize
257B
MD54587d493d062954bde10da3bb1f986a2
SHA18d3a87c533ab8cfc51168913955790c46a39ff10
SHA256620c0e90f5286f903c5501d7703e439cb3d6a9d8d47c8e614d7a53d0d588360a
SHA512a5fbdc1d24fffec4aafc492a6b0779eab2fd926f39c41f49f0481fafed3918c77658ef23d915d3c99b9af358c2186242b4bca9f5c43ed5b459829b134f6e3d2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5nsco79.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD53a010d675c0199be1931071fa804684d
SHA1953eba09f71f8ccd9015ae3a97aeb7b2b870587e
SHA256e602a044156601c74de15646919021634821705181a181de4926a8c9431b18bb
SHA51245bf4b63fe0052927dff6d152413f704ae28baa27a80b49ff9acfc3720166dcfe5b06754c6784fae89d7f72dbe58551ea2a03341b07e9922e3c1e00074031c36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5nsco79.default-release\datareporting\glean\pending_pings\9cf93943-7139-428f-ad85-13e1c9005086
Filesize746B
MD52bee3fa4f15db30560cdca19cf3f6be8
SHA1b5695d32d782a27c67cd8ec9d5d6082ad519647b
SHA256465bde7a7e49446d5dfadce1f1f3ffc662436c6d11b163bf97f6f57537c9bb43
SHA5123a797848caf880c374fafd0d276a7a223132e51d55bd9baa6a8334abe546766b57e11d5e3562d4d777c1565f2f13e47587e6beb2e18eb9be49149d1e24085f7a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5nsco79.default-release\datareporting\glean\pending_pings\bf6a712b-1f95-4eb9-a187-f65a2aef4dc7
Filesize10KB
MD5d64512ecd3503fead85465c090538c67
SHA12f2ffedfa6511ece5d8b9717aefd2b0f4c9f8413
SHA256fec994fdc5a23db223e00f10d27c05ea900457ed94ae69019d8633205a72d63c
SHA51242d2404f4a133cbab1ee8bc24e2eb8d10ed12dafd092d46f3bf7b9f688cb09f2bf91351dc6e61a74c592bfa4c4135783478747151596126a78fde25ebd670a60
-
Filesize
6KB
MD5fd52ef9809b8695cc08302aeb49098d7
SHA14e8c09118841093c0cdc763c6036afc72cbba280
SHA256e7ed1c5a585908a7d9a09e47f2e2febb9a49044a29ed33ebe636af77a0eaac4b
SHA512e1fadd9e3a1c44eb2c465a44c2fae166ab9586cd3445d86573837119957e6127afc90636f37f9fc51d4b186185cc025dea3b67e2d693ab3b144c8c0339765c65
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5nsco79.default-release\sessionstore-backups\recovery.jsonlz4
Filesize1KB
MD5327e9d47b244328a7c05645473d48f56
SHA1286f0aa8985e09b97cae6859893790b56ab43b53
SHA256b3503178fa42510577ad4188097aaead15ce93c0f31db736574ec3ba0328267c
SHA51284d4a6cd9cc9e314a2b80fb6eae054d1c1b97cec699870d68ee94e098ff0a5573c88279e0a413349dfb496f5c75c869a51d932a412b14db53b7f0c3c1ac0a19e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5nsco79.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD50ed2663971e8051b2bcb574926400fa8
SHA1467756bf41c377bdb07c8be10d5391f1df1d80a7
SHA2560c44c9887ebd30506041e4f483422673660df0b74c7468b0cab2c69bee1f4e8c
SHA512e521f02d0a4dc70e3bb33747c5113c76f18f15b4370826ef13700c4f559c8b158ed1d8ef79d7d88794bfea61496a75d653237391f2f8b5e53d8574a21f113898