Analysis
-
max time kernel
119s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
07-08-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
98253e05db4faa3ad05aa1843e880710N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
98253e05db4faa3ad05aa1843e880710N.exe
Resource
win10v2004-20240802-en
General
-
Target
98253e05db4faa3ad05aa1843e880710N.exe
-
Size
1.8MB
-
MD5
98253e05db4faa3ad05aa1843e880710
-
SHA1
04a419c2d23b65775328cc8e897e5357ec1e5938
-
SHA256
4358fd7c8502eb3007a60e97f42315dda81c8dda507e3e0913608bf643d6c9bd
-
SHA512
9f8ece8a4fb78968fe066c98587ea5dc8632b3da901e3e01acd373930690dd456965889f6c62a060a31fb474938f33bf2ac435867f7e0ac67e0a8a01e66ff966
-
SSDEEP
49152:kq13YiUJ+me6wlLB4cXZe2EmesjII2IdS8/YyjFy:kO3YPgDvl46guHjIpUD
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
default
http://185.215.113.24
-
url_path
/e2b1563c6670f193.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98253e05db4faa3ad05aa1843e880710N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98253e05db4faa3ad05aa1843e880710N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98253e05db4faa3ad05aa1843e880710N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Executes dropped EXE 4 IoCs
pid Process 2740 explorti.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 276 5110f359c8.exe -
Identifies Wine through registry keys 2 TTPs 2 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine 98253e05db4faa3ad05aa1843e880710N.exe Key opened \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Wine explorti.exe -
Loads dropped DLL 8 IoCs
pid Process 3004 98253e05db4faa3ad05aa1843e880710N.exe 2740 explorti.exe 2740 explorti.exe 2740 explorti.exe 2740 explorti.exe 2740 explorti.exe 1296 8370bd86bf.exe 1296 8370bd86bf.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\46736b552c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\46736b552c.exe" explorti.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2808-232-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-236-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-246-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-292-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-349-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-354-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-384-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-400-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-428-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-437-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-442-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe behavioral1/memory/2808-445-0x0000000000FE0000-0x0000000001ADA000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 24 IoCs
pid Process 3004 98253e05db4faa3ad05aa1843e880710N.exe 2740 explorti.exe 2808 46736b552c.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 1296 8370bd86bf.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job 98253e05db4faa3ad05aa1843e880710N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98253e05db4faa3ad05aa1843e880710N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46736b552c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8370bd86bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5110f359c8.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 8370bd86bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 8370bd86bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3004 98253e05db4faa3ad05aa1843e880710N.exe 2740 explorti.exe 1296 8370bd86bf.exe 1296 8370bd86bf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1628 firefox.exe Token: SeDebugPrivilege 1628 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3004 98253e05db4faa3ad05aa1843e880710N.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 1628 firefox.exe 1628 firefox.exe 1628 firefox.exe 1628 firefox.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 1628 firefox.exe 1628 firefox.exe 1628 firefox.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe 2808 46736b552c.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2808 46736b552c.exe 1296 8370bd86bf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2740 3004 98253e05db4faa3ad05aa1843e880710N.exe 30 PID 3004 wrote to memory of 2740 3004 98253e05db4faa3ad05aa1843e880710N.exe 30 PID 3004 wrote to memory of 2740 3004 98253e05db4faa3ad05aa1843e880710N.exe 30 PID 3004 wrote to memory of 2740 3004 98253e05db4faa3ad05aa1843e880710N.exe 30 PID 2740 wrote to memory of 2808 2740 explorti.exe 31 PID 2740 wrote to memory of 2808 2740 explorti.exe 31 PID 2740 wrote to memory of 2808 2740 explorti.exe 31 PID 2740 wrote to memory of 2808 2740 explorti.exe 31 PID 2740 wrote to memory of 1296 2740 explorti.exe 33 PID 2740 wrote to memory of 1296 2740 explorti.exe 33 PID 2740 wrote to memory of 1296 2740 explorti.exe 33 PID 2740 wrote to memory of 1296 2740 explorti.exe 33 PID 2808 wrote to memory of 1072 2808 46736b552c.exe 34 PID 2808 wrote to memory of 1072 2808 46736b552c.exe 34 PID 2808 wrote to memory of 1072 2808 46736b552c.exe 34 PID 2808 wrote to memory of 1072 2808 46736b552c.exe 34 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1072 wrote to memory of 1628 1072 firefox.exe 35 PID 1628 wrote to memory of 1976 1628 firefox.exe 36 PID 1628 wrote to memory of 1976 1628 firefox.exe 36 PID 1628 wrote to memory of 1976 1628 firefox.exe 36 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 PID 1628 wrote to memory of 2300 1628 firefox.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\98253e05db4faa3ad05aa1843e880710N.exe"C:\Users\Admin\AppData\Local\Temp\98253e05db4faa3ad05aa1843e880710N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\1000036001\46736b552c.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\46736b552c.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.0.1168641509\641061087" -parentBuildID 20221007134813 -prefsHandle 1160 -prefMapHandle 1084 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2c4aaf4e-44dd-48c7-a161-713adf96f240} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 1236 13a06e58 gpu6⤵PID:1976
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.1.1964777574\1893754792" -parentBuildID 20221007134813 -prefsHandle 1556 -prefMapHandle 1552 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0424e6f5-1f69-48dd-b7da-1fa6d230ee6b} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 1568 e73658 socket6⤵PID:2300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.2.1074409840\88855346" -childID 1 -isForBrowser -prefsHandle 1988 -prefMapHandle 1984 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {38039ae8-708d-4369-9959-9eaeca79e491} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 2000 18492e58 tab6⤵PID:744
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.3.986912467\897067896" -childID 2 -isForBrowser -prefsHandle 640 -prefMapHandle 632 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77c4e476-caa6-4a2f-a8a1-75d3daee4d3f} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 1820 1cc0b858 tab6⤵PID:1352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.4.1994432080\1284560825" -childID 3 -isForBrowser -prefsHandle 3716 -prefMapHandle 3712 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9eddf545-9601-4ede-abf3-ca5873c0cfb7} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 3728 1f3d0b58 tab6⤵PID:3004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.5.1526965380\1133061635" -childID 4 -isForBrowser -prefsHandle 3856 -prefMapHandle 3832 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e212a07c-e5b3-4c53-a5e9-845ac187a15a} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 3908 1f852958 tab6⤵PID:2084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.6.829400323\313180790" -childID 5 -isForBrowser -prefsHandle 3960 -prefMapHandle 3964 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {935fe8f4-ce94-410b-bd92-c748612b87bd} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 3948 1f852c58 tab6⤵PID:1616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1628.7.718751907\400502482" -childID 6 -isForBrowser -prefsHandle 4364 -prefMapHandle 4368 -prefsLen 26531 -prefMapSize 233444 -jsInitHandle 592 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c9916d3a-7c67-4f2f-9993-d0023f3b8d27} 1628 "\\.\pipe\gecko-crash-server-pipe.1628" 4380 1b65b958 tab6⤵PID:3140
-
-
-
-
-
C:\Users\Admin\1000037002\8370bd86bf.exe"C:\Users\Admin\1000037002\8370bd86bf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1296
-
-
C:\Users\Admin\AppData\Local\Temp\1000038001\5110f359c8.exe"C:\Users\Admin\AppData\Local\Temp\1000038001\5110f359c8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:276
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD50a59357ee50c8272be24168abcd09fca
SHA12f35f3dedf5b11e595e2cb9cbc036859313c1a3b
SHA25682ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1
SHA512fd3549eaa2b07b241f7bbe205802bec12d5b4c71187122092d56b5026cd24b4fc5702dedbb6edf4c6fe43841001f41c785b394027eba034483e503b7888fb17e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\x07tfuqf.default-release\activity-stream.discovery_stream.json.tmp
Filesize29KB
MD56882fcd8c3cb50749a5cf71c3f57fd1b
SHA1d838628dbb575714ce1fc7888da077c12a086349
SHA2566f15c1c0280e51212541cfa898ef054b0699e6b94c34048c863be90ac498f399
SHA512dc7eee40b9c517a9575160e59fb32191c0f33047af610650023325f1613c7ed31add7af3b519198c033a3b9f8c3d81f2ce10cd6c53429f2118a82de9f456f9b7
-
Filesize
1.8MB
MD598253e05db4faa3ad05aa1843e880710
SHA104a419c2d23b65775328cc8e897e5357ec1e5938
SHA2564358fd7c8502eb3007a60e97f42315dda81c8dda507e3e0913608bf643d6c9bd
SHA5129f8ece8a4fb78968fe066c98587ea5dc8632b3da901e3e01acd373930690dd456965889f6c62a060a31fb474938f33bf2ac435867f7e0ac67e0a8a01e66ff966
-
Filesize
3.1MB
MD552b6dfc2bd72747d3504a704b0170b53
SHA115cde6ef0fc483b514860958901bb5d6bcf7fa2e
SHA256ac30d1d7e808e943b739e88ea26512da2dc7322330ca52732c408bd07e327313
SHA5128bae636e5777d13c547744c3bffd1221a9dd3d6d5a063adb33607190eaebca284be47f6af69576c1328846b22801fc8a8e3c8feb93a999bf55b963ec7d831aab
-
Filesize
187KB
MD559eefb04a8cb9a94d148464cd4324e93
SHA1e1e550383c9de11d18bb6cb5b8d83f62f51340bb
SHA256d9798bda5b0cd389f0b0f184ded085cded77a8652d96be4054789452b2a04ca5
SHA5127e5ee340188a83055311e9dde5c6bad8798899447281c56b0e2741d247c540c3b936fc51ad795ef10ffc8a7a15f616aa46c747b33793e7ddceecdff310614e7d
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
480KB
MD5db2cc5076ce3196893f6369ddb54865c
SHA199a4adc8d2163d59c0a6706cd68f3db54fa40acf
SHA256aa8a72e7acc6bf5b2c89481521a17d4b8afbeb8e504b2f7622f1557998aafe93
SHA512e7a819fca8d4df5281f32baeeeacd554fa82abdf9f08fcd8d5c814b9c4901a1c661fcefdd640d581f47313c65bc42dc4161beb296af93bbc44b960b1c9dac426
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5121f2987f2738c95d71c43bbe52b06da
SHA188494ff181cc791abeefe0676ab9b577ea52101f
SHA25658d11d0b47be8af65469fdbbe5fbf1648e71136c9b921f01c3f6acc74cfb972b
SHA512db06d3d77efb620290a782d561f5ff3d580c69001263c9a3c4e035437129e938c80b55f89d45dc7bb32997e97ea96a00b4aa011beb586f9aba1a32ab36bec24f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\datareporting\glean\pending_pings\704e4f4b-4b3f-42e6-a0bd-4ca514add1ce
Filesize745B
MD555605e575eb957fbd73b47108806e500
SHA10c7a98943784d878356f834d2bae188f132c081a
SHA256a824d94ee551e0de70438a1008c6f9a411e65779c3c6f49ccebdbd21bdd206ff
SHA5129311c28d2937920193171164833355366a9a19ec96fd13e331a374ae942d5589cd92d5b2bb40edd1b2f983cda2cf47e13ebdb8fcecd80f69ea325f25bace6005
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\datareporting\glean\pending_pings\9c3bbe89-0dfe-463e-a3ba-5e330c1a1bd0
Filesize13KB
MD53285ea9c9293d434d46344e9192c79c0
SHA17108eeb1bb45daa89590c744439f410a1f323afb
SHA2566ed8b00d9b2ab0e8de178828b0940576e9c9b895dc2d154e9c1f9578e4b281c5
SHA512fd837df8cab4770a2603b405052e4034fb2f33b0505f28007052a5e4c00e45f638d0614c34977e5e837dbd412659144f811a47bf157aa2bea0e710b53e109685
-
Filesize
256KB
MD5856b71c6e2963c3a2916e696a5859e84
SHA1126d20bc491959c6cbe751b3b3c2934f2cead2c0
SHA256db98353069ae3abc53c4464981f1b8aca4aecd113dee1f9b680a437659c0c9ed
SHA512642ed009e42e43ea8807cc022075880541703937f0b5a8ecab7b30eb3418aab95aa7e02824f4d0d099c7f396965e27f7198ea186f25dad6c97ee3f4e7a7897e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
1.4MB
MD5cacbf82b0d892c9129e7a4dc998a51fe
SHA1921fe86cc82ac7b4612e428f26b3f36e799052fe
SHA25646335f3d76d7c5ac2842ee209914bf3e10aaafdf47395f76720581fa82677e7d
SHA51233729a575913dd53e64526536daf31e988eeb78cb49eb584bc2db284c72c0ba57536be1022aaeb22d1a5c7344954da8fcbefe0cb3f6ae721c7f8597acd380828
-
Filesize
6KB
MD5e61c04ee17c41c42e0a17e0e4784b39d
SHA1104e8235bb164bfc38670fc6f9c1f5b837d0c81c
SHA256c5e52f39a51ed6b6dbd8b9ca1a36b7659073ce2ad1538a19e34b3bb4807abb4c
SHA512598bff71a976d9b0781da5c82fb00d13ba6e268f89a9d6b0fba6e7893724ec26bd500addf3e2703c365e7c3755493aea6aa5c97c435bd1bb7532fa23b5bcf71f
-
Filesize
7KB
MD5898ef1fe2c7fbef8c5d5f203e9fc0300
SHA1d3d920ab7cc4f562ac6a4aafbd97ae1d10585049
SHA2566192992c079c867e30317433d7c71cf63e6506121e97db73eda28aee45d8bfdd
SHA5126477141864c494a6c3b613462c36e6f2ec03008ffb02ec06018b56753121eacdaeefcde8acb17c4cc732251566e219a20f5eadb61c3d77e2f73b3935f6a4feca
-
Filesize
6KB
MD53e6255a13b518f1a958836cc066e7091
SHA19b7e88e0eed700670b7118e7ab8659ede1fe6149
SHA2562ba504496867df58a7c14b7d68bf64a85d3e30bf22b975e1f959404419215637
SHA512d7c4599a21ad371b7bfe3a23138d2b407f7f216bcdafd3fe5c5a6960d24a5395eb871ccc523d692c1129bf3ee4c23aef06648360e2bf1215384f064c184e8736
-
Filesize
6KB
MD5541f85440d62fea34dc9aabbbc491ce3
SHA146d84ef95a697b1b2951e9bbb3b6a6acfe1abae7
SHA2560e85cfa9f82919f0f9f5bdfda9364866a52c1a272c1abf68b12dee488a5793c7
SHA51279628904456ba66013f8eeaa8f85dab3c8355459da228d9af7a24bce02f719b4ba5d41cc2c4fee7e5e41872788a7032289e6aefeb9c63878c7edd4cbbe4485ca
-
Filesize
7KB
MD504ef683872f790ba573d12e31a1de544
SHA1c8ff1d5b47c00d5b278d9559f855cbd7e399ad4e
SHA25620dc078f9e34e387b960d6caf082504b98fd0d0f1f0469a4830d774cf4484e6b
SHA51249ac0c9c534129c069b93efdc4dd88b5e2d60602c92a895c3cfbe3bcdba23334bd99693abad7d3cafceaf30dabc28e1a2fd9326c87af7afddff695fe9d6a8703
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD513a965643577651062ba1ef1491150a7
SHA1386ced66f4a346012497c6339c9790cf5f10a548
SHA256905d3fe8b64cc413fd73eb8b21abbeae35ff39e664e14c4355bee1c1a59888ba
SHA512d16ee2e14e5d1d175613cccfae1220722f81bba15dce35e4f0ad03edf9ac0ef4147b9d21926cdfc845359eb4fdb3fb39fb6e353cbfccaa85cc9616ea2920b0fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\x07tfuqf.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5f2e9b1cceaebba610c915fa78ba84d58
SHA10c0aa92ef068b40e877a99e96b6c461c678eda78
SHA2563c136fc37d28e2762c6cedd8e30a94e014599233dad7e70a2eb948a71c993345
SHA512ec83e06c4f5ce011eecb77bd5269298230130a4a870f4151bb2a3a7a10ee3c1fb366417d13845770b85aebe0a214b7b708d00a0bffec229f0210d62feb57327e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571