Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-08-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
98253e05db4faa3ad05aa1843e880710N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
98253e05db4faa3ad05aa1843e880710N.exe
Resource
win10v2004-20240802-en
General
-
Target
98253e05db4faa3ad05aa1843e880710N.exe
-
Size
1.8MB
-
MD5
98253e05db4faa3ad05aa1843e880710
-
SHA1
04a419c2d23b65775328cc8e897e5357ec1e5938
-
SHA256
4358fd7c8502eb3007a60e97f42315dda81c8dda507e3e0913608bf643d6c9bd
-
SHA512
9f8ece8a4fb78968fe066c98587ea5dc8632b3da901e3e01acd373930690dd456965889f6c62a060a31fb474938f33bf2ac435867f7e0ac67e0a8a01e66ff966
-
SSDEEP
49152:kq13YiUJ+me6wlLB4cXZe2EmesjII2IdS8/YyjFy:kO3YPgDvl46guHjIpUD
Malware Config
Extracted
amadey
4.41
0657d1
http://185.215.113.19
-
install_dir
0d8f5eb8a7
-
install_file
explorti.exe
-
strings_key
6c55a5f34bb433fbd933a168577b1838
-
url_paths
/Vi9leo/index.php
Extracted
stealc
default
http://185.215.113.24
-
url_path
/e2b1563c6670f193.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 98253e05db4faa3ad05aa1843e880710N.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ explorti.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 98253e05db4faa3ad05aa1843e880710N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 98253e05db4faa3ad05aa1843e880710N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorti.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion explorti.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation 98253e05db4faa3ad05aa1843e880710N.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation explorti.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation df277a496c.exe -
Executes dropped EXE 6 IoCs
pid Process 2904 explorti.exe 872 df277a496c.exe 3676 219f972a0e.exe 1832 cec07ac5f6.exe 3536 explorti.exe 452 explorti.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine 98253e05db4faa3ad05aa1843e880710N.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine explorti.exe Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Wine explorti.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\df277a496c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000036001\\df277a496c.exe" explorti.exe -
AutoIT Executable 12 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/872-470-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-490-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-491-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-527-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-831-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-1225-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-1489-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-1998-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-2584-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-2588-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-2590-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe behavioral2/memory/872-2592-0x0000000000C80000-0x000000000177A000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 22 IoCs
pid Process 1880 98253e05db4faa3ad05aa1843e880710N.exe 2904 explorti.exe 872 df277a496c.exe 872 df277a496c.exe 3676 219f972a0e.exe 3676 219f972a0e.exe 872 df277a496c.exe 3536 explorti.exe 3676 219f972a0e.exe 872 df277a496c.exe 3676 219f972a0e.exe 872 df277a496c.exe 3676 219f972a0e.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 452 explorti.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\explorti.job 98253e05db4faa3ad05aa1843e880710N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5900 3676 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98253e05db4faa3ad05aa1843e880710N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorti.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df277a496c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 219f972a0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cec07ac5f6.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1880 98253e05db4faa3ad05aa1843e880710N.exe 1880 98253e05db4faa3ad05aa1843e880710N.exe 2904 explorti.exe 2904 explorti.exe 3536 explorti.exe 3536 explorti.exe 452 explorti.exe 452 explorti.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4920 firefox.exe Token: SeDebugPrivilege 4920 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1880 98253e05db4faa3ad05aa1843e880710N.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 872 df277a496c.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 872 df277a496c.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 4920 firefox.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe 872 df277a496c.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 872 df277a496c.exe 3676 219f972a0e.exe 4920 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1880 wrote to memory of 2904 1880 98253e05db4faa3ad05aa1843e880710N.exe 86 PID 1880 wrote to memory of 2904 1880 98253e05db4faa3ad05aa1843e880710N.exe 86 PID 1880 wrote to memory of 2904 1880 98253e05db4faa3ad05aa1843e880710N.exe 86 PID 2904 wrote to memory of 872 2904 explorti.exe 87 PID 2904 wrote to memory of 872 2904 explorti.exe 87 PID 2904 wrote to memory of 872 2904 explorti.exe 87 PID 2904 wrote to memory of 3676 2904 explorti.exe 88 PID 2904 wrote to memory of 3676 2904 explorti.exe 88 PID 2904 wrote to memory of 3676 2904 explorti.exe 88 PID 2904 wrote to memory of 1832 2904 explorti.exe 89 PID 2904 wrote to memory of 1832 2904 explorti.exe 89 PID 2904 wrote to memory of 1832 2904 explorti.exe 89 PID 872 wrote to memory of 1516 872 df277a496c.exe 90 PID 872 wrote to memory of 1516 872 df277a496c.exe 90 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 1516 wrote to memory of 4920 1516 firefox.exe 92 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 PID 4920 wrote to memory of 3476 4920 firefox.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\98253e05db4faa3ad05aa1843e880710N.exe"C:\Users\Admin\AppData\Local\Temp\98253e05db4faa3ad05aa1843e880710N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1000036001\df277a496c.exe"C:\Users\Admin\AppData\Local\Temp\1000036001\df277a496c.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23602 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f07d6d98-271b-408a-8198-dbdf797176cc} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" gpu6⤵PID:3476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2436 -prefsLen 24522 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2bccfd7d-11b3-40a1-98de-ae96a2aa4690} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" socket6⤵PID:1720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2884 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 2900 -prefsLen 22590 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {47c86435-34ed-4b56-8e55-73dfc204ee1e} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab6⤵PID:4540
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3748 -childID 2 -isForBrowser -prefsHandle 3132 -prefMapHandle 2776 -prefsLen 29012 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09a172dd-4206-4380-9a1b-66ba253aed88} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab6⤵PID:3548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4608 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4600 -prefMapHandle 4596 -prefsLen 29012 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {16c1995b-0d46-4e27-99af-fb830df6d2a9} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" utility6⤵
- Checks processor information in registry
PID:5156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5276 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5264 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce43ebe9-2f16-4375-979d-ffb174eb40eb} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab6⤵PID:5692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5420 -prefMapHandle 5424 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b385ecb-eaa4-40d9-a3d5-836acd97bca1} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab6⤵PID:5712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 5 -isForBrowser -prefsHandle 5608 -prefMapHandle 5612 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e75555fc-39d8-467b-9750-a1ff8e2244db} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab6⤵PID:5724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5904 -childID 6 -isForBrowser -prefsHandle 5936 -prefMapHandle 5448 -prefsLen 27039 -prefMapSize 244628 -jsInitHandle 1140 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {891d264e-75b6-49c0-92a6-fbb23a7f9c59} 4920 "\\.\pipe\gecko-crash-server-pipe.4920" tab6⤵PID:2432
-
-
-
-
-
C:\Users\Admin\1000037002\219f972a0e.exe"C:\Users\Admin\1000037002\219f972a0e.exe"3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3676 -s 14004⤵
- Program crash
PID:5900
-
-
-
C:\Users\Admin\AppData\Local\Temp\1000038001\cec07ac5f6.exe"C:\Users\Admin\AppData\Local\Temp\1000038001\cec07ac5f6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3536
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3676 -ip 36761⤵PID:5672
-
C:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exeC:\Users\Admin\AppData\Local\Temp\0d8f5eb8a7\explorti.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:452
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD50a59357ee50c8272be24168abcd09fca
SHA12f35f3dedf5b11e595e2cb9cbc036859313c1a3b
SHA25682ebec3391c43c860cf1950e342cee1b4a55f2540ba7cc2ca768bf570f1bf1c1
SHA512fd3549eaa2b07b241f7bbe205802bec12d5b4c71187122092d56b5026cd24b4fc5702dedbb6edf4c6fe43841001f41c785b394027eba034483e503b7888fb17e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\activity-stream.discovery_stream.json.tmp
Filesize18KB
MD52087f0c31c8d4eb41235a64982710afd
SHA1e23709adc50eeba25de28503e9ee0354cf903965
SHA2561a900074baf6131fd476ed77983a636acb196521c42d8fcae94e15c303bda49a
SHA51273603d101c89d21782613e174ad7267282ceff18ca7f2fbbbf651e6ef36e6334de3a13d9b20471ea2f235a5602a840479f9383809842e55f947f4430ca4c18d1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD5c65fabc82ec8f712875de4e1c73b4b1e
SHA132c6c2babd945442eb6f7913d2a58a694d1208c4
SHA25629e848c70296e9823b1ed96dc9b35d456bbb68b3bb7613d5c4d2b6cec8a4ec25
SHA512291595715db4763dc068cb2deef26f36e6757633d0832daa1f98999935761165b7fc99028e715e01eac0de7e53570bf47542df0ba405cac91b4f5d38eff3fbde
-
Filesize
1.8MB
MD598253e05db4faa3ad05aa1843e880710
SHA104a419c2d23b65775328cc8e897e5357ec1e5938
SHA2564358fd7c8502eb3007a60e97f42315dda81c8dda507e3e0913608bf643d6c9bd
SHA5129f8ece8a4fb78968fe066c98587ea5dc8632b3da901e3e01acd373930690dd456965889f6c62a060a31fb474938f33bf2ac435867f7e0ac67e0a8a01e66ff966
-
Filesize
3.1MB
MD552b6dfc2bd72747d3504a704b0170b53
SHA115cde6ef0fc483b514860958901bb5d6bcf7fa2e
SHA256ac30d1d7e808e943b739e88ea26512da2dc7322330ca52732c408bd07e327313
SHA5128bae636e5777d13c547744c3bffd1221a9dd3d6d5a063adb33607190eaebca284be47f6af69576c1328846b22801fc8a8e3c8feb93a999bf55b963ec7d831aab
-
Filesize
187KB
MD559eefb04a8cb9a94d148464cd4324e93
SHA1e1e550383c9de11d18bb6cb5b8d83f62f51340bb
SHA256d9798bda5b0cd389f0b0f184ded085cded77a8652d96be4054789452b2a04ca5
SHA5127e5ee340188a83055311e9dde5c6bad8798899447281c56b0e2741d247c540c3b936fc51ad795ef10ffc8a7a15f616aa46c747b33793e7ddceecdff310614e7d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\AlternateServices.bin
Filesize10KB
MD5aa87bdd7d900e83642617a6f4ed304a9
SHA1933e5dc75a44a8448c36eea0c3015f86ff173100
SHA2567e6a5004af439b4b0947162fbceb5bb0608f6aab167775c789231daa7806ac0f
SHA5127e1097dbf0ff5e6402f36adeedad7fff891811213ba0d3d569dbe32f243ba1a45519ad35e86d1f8522bc3db34daebcee73b074c053887965e66418521faf7d0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\AlternateServices.bin
Filesize16KB
MD51566e9fc7c371a3f3cc7f2a522f4c9f7
SHA1278509ab0ba30a8bc932a7d52cc2298578758fc5
SHA256a6743262b5de492cfb4f7067baaa466c281bd7b0322704f2d4aef823ccdcda65
SHA5122d45769b035a560aa952c9ad5d9b9576e5d771da58f071c4f3e26f76e6ef61347024197c12b68e4d02441b2a1c812d56a5d707a2deddead2d4129a6488853dfa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD545c449f62641b0a98509cdd0b97e3b13
SHA10b82751184543ef2ecf308abea69650e817542bd
SHA2564591a9396c264617e2bfed14c85cf8b95e9bb66719b4d7d0cf5cf9fc7ea95802
SHA512967be3fe2d6f8b5cd2f23946d75760724e100ae08bdc3d3185cdf8a2cfc20acf83e202038c20c8b0c77af6eb9f4c818a85d9c3545f27176e9d0e13def89f0d1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58b6bd9896ff7da2455e4e1d2c92b9755
SHA1c47c41cf5a8be202f881422cbafec8f88f8892e6
SHA256f688de2016e4f2d5d9d876f3b2e88ae42447915e02cad73f038989d13aabd54a
SHA51208ae72b40692b3510268f65a8aa1bdd235cd5013e52d275d76823c9da05f491cdc077d0dd673f648c72e9c5112c71f0bac72703356dc7515505536ee6ce6322f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD500fb08eedd15965d458bcda17d874a0b
SHA129f4ff15a1c82c45fa003413ba7b0167fcdcc481
SHA256bb53f17bdfdafed1adb80e9e2ae34414ebf6b065b08d5874dc092a8d37786616
SHA512c5344df48a1d04ad853b922a9a1a4a0888ed785a0b1f82a5d4b90d5b5af1dbf045dabfecdd2bce9fe857be0fcee88d6ac3e23cb9811a0e15bf552dd7fe1fedcb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\68237e32-3cdd-4777-8dbf-ed1f941a3cb5
Filesize982B
MD587ca2fc1a29e6fb301be158f32e463c2
SHA1b0c7bd1c049bff093caa2e0e6897a11c29e87a88
SHA256310fc1877b298fbc7a81503adf36ecb330ce291dd2264ebaf8cf27fe4265bb9b
SHA51293be53e61b59a2d2595d570a26bb551c30819cc1eb96708ab05e25861ea72289f0d884b3634ca795e992f3c5c2cfaef543740b5b5b30b7b8e03cdc03f05f7cf1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\8f4f939f-fe5b-48c1-9628-3df5c2930166
Filesize671B
MD50c76ce5677a77f872790bdee4177f3d5
SHA16ea5d190ed7b6f6842125f8d3fa5ba38f1b0d9b3
SHA25620513d8d9fde7c3608f8f6acde4ffe9a38b249d132d9c03ca444d12488f8fa2f
SHA5129d1d8671d9eeb657b09d9c55964cf40098f3407dfb45e4a28962ebf00383f2f5221ee886305ac9526f3226105b1ce5403901e4ac8db00b5fb5b00a8fe075495e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\datareporting\glean\pending_pings\c3fff346-1730-4709-b643-1b35632adf43
Filesize28KB
MD55ad20f67b880e6e60cc0fcbe5db71d3c
SHA12c3d2cd137b42b260c22c73288e2f976d7157f32
SHA25612e81dd1ec2916af60f55ed2e67e05694bf2556a5a855491de4b6857d43eb426
SHA512be273833f0703a2d87a7bda32af65a76bc2f6d7875576c6e5b3b547105c493a95f66b4cfe113fe63016d7b2b1a9b0d14ec76630437bf5bb83db61b4b1bd7f248
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5b20914d57eaf020e69e2afb2d69c5f41
SHA1d2038619b5808038f48ce7031f308cd259d66f32
SHA25643e3f663cd68e9616c417fe61e93e24a2f98860d533e3087198654ef59e6af13
SHA5128a39b4ddf9ed623198cf68b56b5aaeee9864cfaf2a0865c8b90caa22fce031b24bb72ecd3394b59b2a1cea4c6748f5f2f1c7ed2178876996d1ae7434ad24932b
-
Filesize
12KB
MD5d06fe3aae80874f163143de79a608403
SHA1ab6573868dd6ccf35655f00050a85fd703c4179e
SHA256339668b735cd0b8a526c0a81c4e61d71298f7526717b6b6d5d9c005d376e6c68
SHA512cbb108cc74d484b325914ccd2ba67ebde4bb1feb4c5d117b91082ba07c59bb0f9fb731ecabd68b791cb6e7444ea073077e0e5e37945db5414bef17f85afe5e30
-
Filesize
15KB
MD598e9d03525828f8f80522d38a7d36449
SHA171359cb879dd1d57af0a8a9985b0912c10642217
SHA256083a6f4d63908e87f2802c795ee295374e02e4b6763ee9909b00e0a3521b939e
SHA512fac566f6c69eb493b63f2dfdc7411d64d7337487e471772a967feda0802d70cf7d76a0c20658121cff9cdf9078768bd7e485b3ca14ee8fd00c2c28632268cf97
-
Filesize
11KB
MD5e7c8476d83eba5285fb786ce252d083b
SHA1c2a39d65fc9f2ff96df1c04b7c2f4b80f8b536f5
SHA2564513cdfe13c3752484b31206bbc4dae0514b556077a0c25f3d0534b5119f372c
SHA5128b2eb43495420b902de3fd02ed5777763620923065252087ca3e285b73c3d56cd2c955bc8c8afec624e01b994b33189d9fa3bcaf38dc09ce6fba3f982df255e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\pj0o4bl8.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD5dcbe09be4d423292158af4dc221509d5
SHA150855bd0030597e96209eaa88022487c28600886
SHA256f6ec09f0c3532a9fa1289036e14522ba6a4433f1a9609f1220b28c31649d774b
SHA512af84b10a9db91668d129f8870f0fa2016bb7d1383f8df20562dcd7a9d725df27ca676de2d479ba8a912dab25bd2337ac46943dbe1f530fe06ff3849833d723c6