Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/08/2024, 21:57
Static task
static1
Behavioral task
behavioral1
Sample
e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral2
Sample
e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe
Resource
win11-20240802-en
General
-
Target
e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe
-
Size
3.1MB
-
MD5
38f619582609c19210fccc5978fd7a9e
-
SHA1
cde2a538a01e5cadd03c3cf11898f8bce3ba2ee0
-
SHA256
e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5
-
SHA512
1c2dc2a7e3c42f45df896af434eb7a303fee35eded9ad9ca29cd6c069af755e638d5616804f26854b6caf7fcd17f5d76fe97a8ff95583426e914644ca1132afa
-
SSDEEP
98304:DwVppcSYwQJB1mtUC6hbPVNkAPlNymL1Z1IFi3YGw:DwWsQIWCcjVZ/r1U
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
AutoIT Executable 15 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1740-351-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-368-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-369-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-425-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-1107-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2012-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2553-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2560-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2561-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2562-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2563-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2564-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2565-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2574-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe behavioral2/memory/1740-2576-0x0000000000290000-0x0000000000D75000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1735401866-3802634615-1355934272-1000_Classes\Local Settings firefox.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3940 firefox.exe Token: SeDebugPrivilege 3940 firefox.exe Token: SeDebugPrivilege 3940 firefox.exe Token: SeDebugPrivilege 3940 firefox.exe Token: SeDebugPrivilege 3940 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 3940 firefox.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 3940 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1740 wrote to memory of 5652 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 80 PID 1740 wrote to memory of 5652 1740 e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe 80 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 5652 wrote to memory of 3940 5652 firefox.exe 83 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 2140 3940 firefox.exe 84 PID 3940 wrote to memory of 4584 3940 firefox.exe 85 PID 3940 wrote to memory of 4584 3940 firefox.exe 85 PID 3940 wrote to memory of 4584 3940 firefox.exe 85 PID 3940 wrote to memory of 4584 3940 firefox.exe 85 PID 3940 wrote to memory of 4584 3940 firefox.exe 85 PID 3940 wrote to memory of 4584 3940 firefox.exe 85 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe"C:\Users\Admin\AppData\Local\Temp\e855a64728d573d33d4cdf0c2cf0573c7d99db1fc1c7a3ecf2646bfbce7b78d5.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password2⤵
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password3⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1968 -parentBuildID 20240401114208 -prefsHandle 1880 -prefMapHandle 1836 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7b4eabba-1657-44ea-a7e2-b9f95efb058f} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" gpu4⤵PID:2140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2384 -parentBuildID 20240401114208 -prefsHandle 2368 -prefMapHandle 2364 -prefsLen 24598 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c7d19076-6996-4d7b-abca-fd294503f453} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" socket4⤵PID:4584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2916 -childID 1 -isForBrowser -prefsHandle 1328 -prefMapHandle 1388 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89c50bcb-87cf-444f-92db-09f2f77ea7ec} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" tab4⤵PID:4448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3640 -childID 2 -isForBrowser -prefsHandle 3632 -prefMapHandle 2720 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2123e608-3e25-42af-a7f9-dcdefcb2f401} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" tab4⤵PID:1040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4768 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4760 -prefMapHandle 4756 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5c2c6dc-138d-437f-be20-bfb8779e410e} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" utility4⤵
- Checks processor information in registry
PID:1972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 3 -isForBrowser -prefsHandle 5712 -prefMapHandle 5708 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ff041adf-4e05-4081-9da0-0d1ebc491e58} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" tab4⤵PID:4940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5732 -childID 4 -isForBrowser -prefsHandle 5724 -prefMapHandle 5720 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a984e9c-dbcb-4ddc-a831-b23572b08f67} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" tab4⤵PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6136 -childID 5 -isForBrowser -prefsHandle 6128 -prefMapHandle 6124 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {00dedf5e-1d59-4c99-a226-0b2b7ddfd61c} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" tab4⤵PID:4276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6276 -childID 6 -isForBrowser -prefsHandle 5964 -prefMapHandle 5124 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b74b6896-dbc3-4a4c-bf70-bd076967a20e} 3940 "\\.\pipe\gecko-crash-server-pipe.3940" tab4⤵PID:3416
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yel8o60i.default-release\activity-stream.discovery_stream.json
Filesize45KB
MD517765a78dcacb0b42d15f7fce46f54ac
SHA1571883b5d4d4ee2125a96df52731b7dc4e7c577a
SHA2568d68ab57e0e572f66447bb6d2f0b33c3e9218ee505b3be14d822f40eeb9ab8ff
SHA5127b30eda349886939a6c0d3e067b5c6fc6d13e050e1115fcb47e7adbad30c43552fc1ef9fcbb0121b21ee5db8fcfe984244b30cb3f81fcd03993cda6f6703a7e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yel8o60i.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD5103528b910a20aa70dde51b6d1cf4b73
SHA196e983979f3297449b4d465cb2da144ca28fd463
SHA25632beae10eb526aca898075af352d349e9a6747766f1af067d93b887e9c02376d
SHA512b938b9b6ead47069ba5f39e4273c20051d9247c8a1131d8f4a79d9981ad8bdb4feb7d1a8d790e9440c1dc7dbb8cbe4aa5ec9cba4f5ee6feb73370ce85762373c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\AlternateServices.bin
Filesize10KB
MD58d8444504681ef7a8edde94d479842fa
SHA184480060cfd6b8ae296ffd68e74094f83adfdbbb
SHA25617913fb174d84a6885ec7859f29e8cb892c51c856d535988f6f376c1f562d1d8
SHA5120129aa219d37c587eeb5b031935b9d461f398532aa5897011f99b824ef248c44b96ff261cd266ec88218ef077a1de6051f367f3bf70ba8f67073760b83c70bc5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD56225676b159e3c5fee2f4c38a27accc2
SHA11357a0cf9068a423d7522ff98751d861f1170679
SHA25678f7f7cd4720ffc503c5c152649e05d90ce4bf482af74bb09ef8e202a3108e8b
SHA512e1ba0bc1954ac926bfcd0ca1c2714f7c55edca8200c71982fa9cb3035ab304db8500087bba59c556f1732ba6df94d2b3a3f8359b8dab18914e13233863e14c7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5203ea75a237389b4742534d1698aab1e
SHA1f2de8b25239ffb720a86262b26cf05374709f148
SHA25672d5abda73c3e4a41fa5e99f6b7a3c51ecd41a5918520d923d2ec0508cb79ad0
SHA512d6ea0e5560cb43c637f54a60e2592ff0e3e866ecd1997abe0b82b1b7d78c70d5c9d2d0356cabb71c59762dd4dee67ad52199446ec001af13115174c1fa344175
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5a9d4d7bb36da19e902ea912eb080b43d
SHA1c64646e0aa94fa69d03e0a443181e8323369218a
SHA2565b49b07c866847877f7f52eb4ba90e5bd5e52103e502f0dd0d25a94dc23fb70a
SHA512ad3c8e86335376edbb97cdf01deb54580f050fc4f22b6ac9ceb28c74a1ece1ca6c5f796f03bd3f7fc56bf28ec4b2034e06a21bce7d37c482e737733c00290621
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD54724f81f611d15b16c25457b195672f4
SHA1b9f8e1ace5b8d90f07a93644ca5e4b3a55eeca82
SHA25659e0a3b985f1021e62969aabd9f8e72cd5de64d7ae5c43cb4f398eaab695a059
SHA5122a962c4d8eb83bb92cc6f3618773d1eeddd9ea47322cea84518624edc0e16ce0cb44c64ef2dc5e72574a897dc5cec9b2aa944c0f1d91f6e17164eae1a1bce89a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5bfbf3a6f078b3ee93ba2f070c37a54f7
SHA11ffb89b14a0fc080abd793c07dfecd57b5c3179e
SHA256f876becb9254b33c0e0b0732d574c8ec44ce346e4536065a24a9119b3823d923
SHA51294c4e25acada2faf14303d755aa9f92b7d47a68077e7d5683b9ce15f01ec89a09b355b7e51e0a0423cb3682fc18610c874672b4386146ffb94bb8857228da46b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\pending_pings\53190187-89e9-41e5-894f-807a74befdf9
Filesize25KB
MD563453366ba559a7b2a6a14579b6e8867
SHA131821f6af216cfbe8a897fda8d63742ad89ab32b
SHA2569e907dbbc33d6bb012408929d6b8a386e34b0f3927abb97e098c9a1c07efc8fb
SHA512b02936bc5d60bcbd62d8667961bed4f5eb8fead499cb8298708858a02e54d6059f21803a5010b599c43d9148415e203b988da6c76a427131d509068de08ec7e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\pending_pings\63829cba-7b80-4c4e-a932-7cf56955a12f
Filesize671B
MD51df50c4b7112b004b2a05d9a0f69ef21
SHA1473ab08a77577563deb37f7c5d95185de5932871
SHA256ca17d5b3cd378b8b50ade6708bb21f61f1558f179dc385e0fb4e22adc8a69739
SHA51247358f345179918b55259e39bdfc82dd74ac6ef772e71e17c9c125f7d4375522c79a36a3266a3050c7150ba431bb6572a755f2ffae99a37ed1bd999940089648
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\datareporting\glean\pending_pings\74eaf6d3-be4d-4d55-8865-f346dfea3ad1
Filesize982B
MD50b13d754f2fe857c4e099a0575b1bac4
SHA10bb26c0cac81fa9a6975b8aa14ec19da6d3cff52
SHA2563b6c470834c710a4f7d53ec8ea1e9a6b2458adf0b2d1df5ba0aaf8a0c741a421
SHA5120bdac4a72590447487f379b620a143d12240ae48b63a53c4077595446835128155e1c59677c6025b7a3693bd495551e2161f4514540aabe0345234f9882dda16
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD572e03d06be871bc0a38c2ca16eb287e1
SHA12181e45a0a4c2445365e3999ab07e34585604d0c
SHA256ceed7f257e9802e481720b31fd3d0d215d7009de8960c1c9dc11b515d2052c55
SHA51227dcde3cc1167b7c826df1a15ab4af488b41d4b0c1e5adb908b23386a41c5cf5b4e07dfd2ba397044d654519bed5e6bff32ff3b08520f2609e77eeafe8f40870
-
Filesize
16KB
MD5900ea3272686a2001aa266e75c0a354e
SHA1be7b7fc2107c034351451ed2450848e5b1530510
SHA256b71d72e07e274c73f77bd61793b6db9cf4e646fea6b2fc5d606e21458fe48c36
SHA51231d09cf7e5ed91ef95719d6f7ac873d5813552d8f98774d479b3fbcdeb33538b8c14e35047cbc9089a7ccfcf3191f8f4c094442fc8d3bc14e62b0251de6d60c2
-
Filesize
10KB
MD58545cc3444e83e9f3f7e24fe3c0af196
SHA12ccc1d1885b0ffb73e5d852c5dc39d5902696f56
SHA256251a04d19e6d2cf99fe93b696ec29843eaf8d370fcb60e8d960dbc4e71db7a36
SHA5128c406c227ec5a6001a6f861c563b5d6c2f1fdf00e11fe0a1f99c2b07af89633f6c5d1648dacc4eda5ef0d19ec8f901dfe76f96fabe36a602c4989cbbb1a06f5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yel8o60i.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.3MB
MD549b238b873758b635388ee122e632028
SHA1ae4b15d38d1b52eaa06da5d3ecc5b62abe86bbba
SHA256146ab4e7abc68f846b1dec2fa02a1fcecb7ab9eff4d0afb7a2ed33bb062d8da2
SHA512f8522e55435fb53628a91280f1ce436fe977c93cfaa6dec0dd0f768e62502b57bf0e95feed56defe9994c8b816d119401d099c6be5bc59ebe01302234c0ddae4