Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 18:22
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe
Resource
win10v2004-20240802-en
General
-
Target
SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe
-
Size
1.8MB
-
MD5
678c2ac57cd26feb4f051c0b40b7b399
-
SHA1
24082d08ae037812a37eb9b30dafeb2d017edd25
-
SHA256
3c00cc8edc77abf01ae9b9b0e7e51a8bdac7f6c3a3b52ceed4caff7f4f5155ef
-
SHA512
0f12533cdba516561d2a08d75107edc756d1c0910117aca98f9784763d1b2321cfec319407a63cbcea37f7e73a5f19ff11b8409e45db6394c7cdebbec778718d
-
SSDEEP
24576:cJxq3Vw58eylog0GwbgAwINk5lQGC7bfTk6ht6RjBp/eroj0UbJ2OcYxHFch7AUD:cy658u/wH5i5TzhE3tJjZFchcV2J7nb
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
default
http://185.215.113.24
-
url_path
/e2b1563c6670f193.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 1c152c9ee9.exe -
Executes dropped EXE 6 IoCs
pid Process 808 explorti.exe 3824 1c152c9ee9.exe 3744 5a7747ff38.exe 1800 ae704e1d33.exe 3076 explorti.exe 5492 explorti.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1c152c9ee9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\1c152c9ee9.exe" explorti.exe -
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3824-418-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-435-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-438-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-494-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-1473-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2543-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2550-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2555-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2557-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2559-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2562-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2566-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2568-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2575-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe behavioral2/memory/3824-2577-0x00000000005D0000-0x00000000010B1000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 21 IoCs
pid Process 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 808 explorti.exe 3824 1c152c9ee9.exe 3744 5a7747ff38.exe 3744 5a7747ff38.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3076 explorti.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 5492 explorti.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4604 3744 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1c152c9ee9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a7747ff38.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae704e1d33.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 808 explorti.exe 808 explorti.exe 3076 explorti.exe 3076 explorti.exe 5492 explorti.exe 5492 explorti.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe Token: SeDebugPrivilege 2852 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 2852 firefox.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe 3824 1c152c9ee9.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3824 1c152c9ee9.exe 3744 5a7747ff38.exe 2852 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3104 wrote to memory of 808 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 86 PID 3104 wrote to memory of 808 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 86 PID 3104 wrote to memory of 808 3104 SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe 86 PID 808 wrote to memory of 3824 808 explorti.exe 87 PID 808 wrote to memory of 3824 808 explorti.exe 87 PID 808 wrote to memory of 3824 808 explorti.exe 87 PID 808 wrote to memory of 3744 808 explorti.exe 88 PID 808 wrote to memory of 3744 808 explorti.exe 88 PID 808 wrote to memory of 3744 808 explorti.exe 88 PID 3824 wrote to memory of 612 3824 1c152c9ee9.exe 89 PID 3824 wrote to memory of 612 3824 1c152c9ee9.exe 89 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 612 wrote to memory of 2852 612 firefox.exe 91 PID 808 wrote to memory of 1800 808 explorti.exe 92 PID 808 wrote to memory of 1800 808 explorti.exe 92 PID 808 wrote to memory of 1800 808 explorti.exe 92 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 PID 2852 wrote to memory of 888 2852 firefox.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.TrojanX-gen.8387.16538.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\1000036001\1c152c9ee9.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\1c152c9ee9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2aba0bd3-ca1d-41fa-bc02-f5a57a0c7adc} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" gpu6⤵PID:888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2b02a302-ee04-488c-a07c-fdc3343a10ad} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" socket6⤵PID:1908
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2876 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 3268 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4626fb9e-b3bc-40da-b733-4cf71413ea9f} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab6⤵PID:2296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2768 -childID 2 -isForBrowser -prefsHandle 3672 -prefMapHandle 3668 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ff5ea4a-4ffc-44cc-ba63-e6017741cb0f} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab6⤵PID:3148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4468 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4460 -prefMapHandle 4456 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {74539753-8e34-4ed0-aba0-a81493069305} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" utility6⤵
- Checks processor information in registry
PID:5156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5216 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 5232 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {640ce656-d906-47e1-b0cf-1fd222a95795} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab6⤵PID:5744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5204 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cdd7260-2544-47b6-a40a-fcd943829893} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab6⤵PID:5756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 5 -isForBrowser -prefsHandle 5668 -prefMapHandle 5676 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53cabf15-a58e-4a4b-b43e-e02082494734} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab6⤵PID:5768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6252 -childID 6 -isForBrowser -prefsHandle 6240 -prefMapHandle 6244 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1304 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {add2bb51-f0d5-4bf3-a7ee-60a83ec277a0} 2852 "\\.\pipe\gecko-crash-server-pipe.2852" tab6⤵PID:4092
-
-
-
-
-
C:\Users\Admin\1000037002\5a7747ff38.exe"C:\Users\Admin\1000037002\5a7747ff38.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3744 -s 13884⤵
- Program crash
PID:4604
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000038001\ae704e1d33.exe"C:\Users\Admin\AppData\Local\Temp\1000038001\ae704e1d33.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3744 -ip 37441⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3076
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5492
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD59545551bcd4b4c9748e7d63a9a3debfd
SHA1e3271e71d336203ef9620e1be008e841783874a6
SHA2567f84d77bb8e7576c98a02d2bfe8022a4297084fa4d2d4a73fe15c08bbb0bf0b0
SHA51282ad1bb091c5229626e0f78cf03b50aaf3e529a1f048c04c599d68a18788365bae39df2bbbbc793ac492df106db9fb80cd52a5f537a0f4b559c35533d6440d72
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD573eed7cf220224a4bdc1e59faa325c88
SHA1fd3326c2f0453fb7a84e61ad5951db9545509fc3
SHA2569dd91fd965086f68f9fdf4d7f3cb0f571d98c35c198da595f9e2e43997a8cbbe
SHA512b79e149c06c994323ff323b53c5a0e69104cd457eb12740c45899c5122c17e026567b9c4eaaa81b7a4705bece74efc9e3fbe64254497cb9eb9f422d924a7bda8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\8A2034D325DC0B5C9E11EDDA3FC70A54C8DC1C0D
Filesize13KB
MD5d9ae2c0fdcc2dff4b0318a576aadcf67
SHA10c82904e420f833f1a587954bb55903009886c85
SHA256bd43e83c59d94ff54496c0b3ae61e73010a8b056b726b6aef69b911497a1974f
SHA51217a5149241107111133e46ceab9550ca4b34442408f1d0709d4a85ccbc823f6ef54dc358ee3ea948d033d311629093004b44f655ab617839c4092404f01bb9d7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD5546a9f190b525bda88d2f72c9ffdac45
SHA1898c87713929d1bdc19a10ab4bac7824c1157dea
SHA256ab2db91e522aba45b856f3b42ce90a7b9b22e9339cfa6771e169b3ffebc0ebb4
SHA51266b2717458ee12a582cbb8c05172239f78ccc8eddde909e87b7365d9c0a43d88de45cb0e0f04f5dcf9b41df5a1bcb6925cf3add8ce08153b2b82b01f92e46604
-
Filesize
1.8MB
MD5678c2ac57cd26feb4f051c0b40b7b399
SHA124082d08ae037812a37eb9b30dafeb2d017edd25
SHA2563c00cc8edc77abf01ae9b9b0e7e51a8bdac7f6c3a3b52ceed4caff7f4f5155ef
SHA5120f12533cdba516561d2a08d75107edc756d1c0910117aca98f9784763d1b2321cfec319407a63cbcea37f7e73a5f19ff11b8409e45db6394c7cdebbec778718d
-
Filesize
3.1MB
MD59eeec7b34152da4427c8f6a669f2bbed
SHA1ac7c62d2aca1785da5d0dec6efce2c43c7d91479
SHA256cfcaf0be7b9049d3a39b5235a2985cfa7581b4fecf2f95cf58789a9a4f8b87df
SHA512a81c76cd9610d4c5254282737d903964b5111431086de21a3bebe0905cc284d507d875ad9ddd2cebec56d2934bba096cdc0d18feddb8ca0111aecd689a0c6831
-
Filesize
187KB
MD559eefb04a8cb9a94d148464cd4324e93
SHA1e1e550383c9de11d18bb6cb5b8d83f62f51340bb
SHA256d9798bda5b0cd389f0b0f184ded085cded77a8652d96be4054789452b2a04ca5
SHA5127e5ee340188a83055311e9dde5c6bad8798899447281c56b0e2741d247c540c3b936fc51ad795ef10ffc8a7a15f616aa46c747b33793e7ddceecdff310614e7d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin
Filesize16KB
MD51d491dbae8849800255b47dc5d2bca3c
SHA1ba6a36258873659bb9de139a69e0651d9bd0dc00
SHA256c2235e84626f4da73b4a68c1eb6099b64a7a5d5140ece2d299d537141566e168
SHA512e92dabc4cc3cd03aa7b7243c38bcd694d41cadd77888ea6119456953b4c8bacdf9bd1be6b268bbb67283d36b3bbe7744f36e8f9918898650028482725e23b225
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin
Filesize7KB
MD5a4f0f13b92736680a5a45127b0e44e1d
SHA16aa6fc4153be7c7e2f0f6056a438370e0027c602
SHA256b772861230eb950370c3df0bb1f1d0c6a96d55ef4a2f7e2d99c5da40f32116a5
SHA5126913201e5f6f0d85fbfb4ab12e28b84901df4f7e12a9d95839727f4bd1a42b4300efabad53acbed1bd6876bb36e2f848ffb737dfebc4ee0d85666c247e9795b2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin
Filesize10KB
MD53bdeb06cbcd3e41e1428e67d8534f0b2
SHA1d43fa7a33baddffe6e442c6a9718d8bf21614a57
SHA2566afaf88723f22741ac44282c5ffbf07363926cc5fe94f9bb2398a4d95a9ab9a8
SHA5126f6f65973d6b5ef72f2334871ffe919a439f14934d705f078d9e4493d95a1b26a683135ad1ad11af573d22fe331155a3963c30c9c7b589f469804ee03bcd7f30
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ffa068179e1075604d1964891e626b24
SHA10210035c3ebf9c938e3ff32c67eb5244c15f4aaf
SHA25655383fffd2180aa99f5642990e4b572333234900b296de239e73f47cb342134c
SHA51216c24acd744bda1729618e531d6335e182b3a97bda70a68a92335fd01e98901f6a07f74cacbd3e912c23f58c8d9693dea2cb82d39445e9bc9b5be7cb01f53401
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55d55188029bece6ea0c2d78228b489ff
SHA1ae6ab44b36cc4ac41b8a969b529ff48f60c53ee4
SHA2568193e79ba0aa5fe12bad8cfb7be067b6120f2ef0278c2773f5b6163adb177dc6
SHA512d47565ba0378f724f4bf9d89f3fc89176a8cbdc0e9c35ba69cd4ba72d484ae8b2e0447ecc6e1b3529c860792cfe0bb4abd1997fe4ed9d93cfa4829ce9909e193
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5f4ede45f2660d905e45341b9cd6dbeab
SHA1d6559fe8a266b1d61409d0d31a73830b892794c0
SHA25602f49ca47962f722e5b64370d6083d993b8f5359bc8bc019685a69da504bbe2e
SHA512ec3d3a667c8481f5ef0b693e9b8aad87c33bac4b2d5d6a74c58c008909b9a1c98bb5fa64aecd672fdb3b046798a489a4e36368b8a8c899b98a2a5a4062cc5da3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\7357f235-296a-4a1a-b069-1d9fb1a8d591
Filesize982B
MD569e28067c78f38e2503377d03e53ab57
SHA1a68a2427c74f5dc8d0c5fd420d82c7bbdd21b341
SHA256af7a81c05e271a1f0640bcc98e52879fe491164911959dd58bd5928da14ae18c
SHA5127cae8d50eb8247b61cdacd8cda453629b1ca1b4307d16d7c891de4cbaf70db2f40d4a7cb1a5567e71507c311e933f0db9ed5d753c51e89668d43a7bfe5d441cc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\98b30b80-d9ae-45ea-bdcf-74a6ac9968d9
Filesize27KB
MD5935e140daad54cbdb42e0b8f9b5e4a52
SHA1eb53bed22d494eaa642ec213cbcc008665a952f5
SHA2561e86762986daf59c3ed18936fad8b0da9440c875fbc13a4fe2edacfdb8f6b2d2
SHA512c9792c06716999ed99679a8b85e75959280746b7394db4ab4c8fd090d817375b0ffaf65549b8b883b6fc5f4db9d60678e3f535c01224d6d6bef6e4bff526fa36
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\ba2fdd72-8e61-4aab-bf70-f8633afd9efa
Filesize671B
MD50c34b2d84e0c48ddd983500d56af3d51
SHA1cac7f0e8c72193cda520f8cacb28d798abf5c706
SHA256274576dddb15471cd66f01e7bd1e81bd7e85952212933c4002fcd0793a6642ab
SHA5122c3578ecd6ee1688a4c1485fd978091d7457b40079ce63ca34255bce336fd79881ef2bb1d270207f0b9332e6eb9d38944552486a586c2ca0149706d5679b928f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD55aad742e8f5368e728efb033e763224d
SHA1ce35d227fa88ddcaf10471e899fa6b249ef6f459
SHA2564db1715a7aa393f31b2235447361351fde690bb5e9f3a4f63f605fcbb6f5fde8
SHA512899dfbeaf41808209e98d372bd1ee734da6044be32d4ce805fb8413d420c9b95afc384a7e9f17440c9839d20139da81db597e5349fbb729011265ed0b48b8781
-
Filesize
11KB
MD50a31e8c3ae22d6bb8cf8108d2a09ea20
SHA1b3f5c1dbd0d4e06a32a4a60ef3e20cc64b4151e7
SHA2564306cc81f86096e9370917ebe9e39281849fe5a31d05a79e9a2764ebb0c76bb4
SHA512f63aafba9bf60185bf0b169a085c1f6e11f6ef56018f62dd15afd610fcbfc7befd0a5fed99acc9dcd9f7bb20d39f7b8f678bb27e1cbcdeb1fba11dedfd22b71a
-
Filesize
11KB
MD5e83ad9d9ee12b8f368372f1be748874a
SHA198c7513814edb6ac301e1927686c2619813d4a3d
SHA256e9f744a24d18495646c3c0c8daa38cafe23fdc397b9e89e35d97da28f216c1b6
SHA512acd169c1626cefc6fb8e53826b3b53205a7bef50d08826c07661d159456fb21478d926527b7ecae1a69beacf488e35fb79955df8e1be9f9f216727a0bc3dd293