Resubmissions
30-09-2024 21:45
240930-1l2rsazhpg 1015-09-2024 22:03
240915-1yl7vsvbpf 1015-09-2024 20:03
240915-ystcwa1elr 1020-08-2024 16:21
240820-ttt9cawalj 1024-06-2024 04:58
240624-fmba1a1djm 10Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
20-08-2024 16:21
Static task
static1
Behavioral task
behavioral1
Sample
v2.exe
Resource
win10-20240404-en
General
-
Target
v2.exe
-
Size
121KB
-
MD5
944ed18066724dc6ca3fb3d72e4b9bdf
-
SHA1
1a19c8793cd783a5bb89777f5bc09e580f97ce29
-
SHA256
74ce1be7fe32869dbbfe599d7992c306a7ee693eb517924135975daa64a3a92f
-
SHA512
a4d23cba68205350ae58920479cb52836f9c6dac20d1634993f3758a1e5866f40b0296226341958d1200e1fcd292b8138c41a9ed8911d7abeaa223a06bfe4ad3
-
SSDEEP
1536:vjVXKif7kaCtHM7qpo6ZQDtFnNi+ti09or2LkLpLik8ICS4Ao3uZs/WVEdz725sK:J1MZwlLk9Bm3uW/Wud2K36cn/wCY
Malware Config
Extracted
C:\Recovery\8x2iovw-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/39252004CBFE40FD
http://decoder.re/39252004CBFE40FD
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 1 IoCs
Processes:
v2.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\word\startup\8x2iovw-readme.txt v2.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
v2.exedescription ioc process File opened (read-only) \??\I: v2.exe File opened (read-only) \??\N: v2.exe File opened (read-only) \??\R: v2.exe File opened (read-only) \??\V: v2.exe File opened (read-only) \??\W: v2.exe File opened (read-only) \??\D: v2.exe File opened (read-only) \??\A: v2.exe File opened (read-only) \??\L: v2.exe File opened (read-only) \??\U: v2.exe File opened (read-only) \??\F: v2.exe File opened (read-only) \??\K: v2.exe File opened (read-only) \??\M: v2.exe File opened (read-only) \??\Y: v2.exe File opened (read-only) \??\H: v2.exe File opened (read-only) \??\X: v2.exe File opened (read-only) \??\J: v2.exe File opened (read-only) \??\Q: v2.exe File opened (read-only) \??\T: v2.exe File opened (read-only) \??\Z: v2.exe File opened (read-only) \??\B: v2.exe File opened (read-only) \??\E: v2.exe File opened (read-only) \??\P: v2.exe File opened (read-only) \??\G: v2.exe File opened (read-only) \??\O: v2.exe File opened (read-only) \??\S: v2.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
v2.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\tf7a82y974g.bmp" v2.exe -
Drops file in Program Files directory 23 IoCs
Processes:
v2.exedescription ioc process File opened for modification \??\c:\program files\EditLimit.mpg v2.exe File opened for modification \??\c:\program files\RequestExit.dot v2.exe File opened for modification \??\c:\program files\BackupShow.mp3 v2.exe File opened for modification \??\c:\program files\StepUnlock.aif v2.exe File opened for modification \??\c:\program files\SubmitResume.dxf v2.exe File opened for modification \??\c:\program files\WaitExpand.wmv v2.exe File opened for modification \??\c:\program files\RequestStep.DVR v2.exe File created \??\c:\program files (x86)\8x2iovw-readme.txt v2.exe File opened for modification \??\c:\program files\BlockCompare.xps v2.exe File opened for modification \??\c:\program files\ClearPush.pcx v2.exe File opened for modification \??\c:\program files\ClearUnregister.ps1xml v2.exe File opened for modification \??\c:\program files\ConvertToGet.zip v2.exe File opened for modification \??\c:\program files\DebugInitialize.png v2.exe File opened for modification \??\c:\program files\DisableWrite.cfg v2.exe File created \??\c:\program files\8x2iovw-readme.txt v2.exe File opened for modification \??\c:\program files\ResumeAdd.bmp v2.exe File opened for modification \??\c:\program files\RevokeDisconnect.jfif v2.exe File opened for modification \??\c:\program files\StartRestart.wdp v2.exe File opened for modification \??\c:\program files\SyncCompare.xlsm v2.exe File opened for modification \??\c:\program files\InitializeEnable.WTV v2.exe File opened for modification \??\c:\program files\ProtectUse.ttf v2.exe File opened for modification \??\c:\program files\UnprotectSet.mid v2.exe File opened for modification \??\c:\program files\ConvertMerge.wmv v2.exe -
Drops file in Windows directory 2 IoCs
Processes:
taskmgr.exedescription ioc process File created C:\Windows\rescache\_merged\4183903823\2290032291.pri taskmgr.exe File created C:\Windows\rescache\_merged\1601268389\715946058.pri taskmgr.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
v2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v2.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_QEMU&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1687926120-3022217735-1146543763-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
vlc.exepid process 5964 vlc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
v2.exetaskmgr.exepid process 748 v2.exe 748 v2.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 748 v2.exe 748 v2.exe 748 v2.exe 748 v2.exe 748 v2.exe 748 v2.exe 6864 taskmgr.exe 6864 taskmgr.exe 748 v2.exe 748 v2.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
Processes:
7zFM.exevlc.exetaskmgr.exepid process 4464 7zFM.exe 5964 vlc.exe 6864 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
v2.exevssvc.exefirefox.exe7zFM.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 748 v2.exe Token: SeTakeOwnershipPrivilege 748 v2.exe Token: SeBackupPrivilege 312 vssvc.exe Token: SeRestorePrivilege 312 vssvc.exe Token: SeAuditPrivilege 312 vssvc.exe Token: SeDebugPrivilege 4960 firefox.exe Token: SeDebugPrivilege 4960 firefox.exe Token: SeRestorePrivilege 4464 7zFM.exe Token: 35 4464 7zFM.exe Token: SeDebugPrivilege 6864 taskmgr.exe Token: SeSystemProfilePrivilege 6864 taskmgr.exe Token: SeCreateGlobalPrivilege 6864 taskmgr.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
firefox.exetaskmgr.exevlc.exepid process 4960 firefox.exe 4960 firefox.exe 4960 firefox.exe 4960 firefox.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 5964 vlc.exe 5964 vlc.exe 6864 taskmgr.exe 5964 vlc.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 5964 vlc.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
Processes:
firefox.exetaskmgr.exevlc.exepid process 4960 firefox.exe 4960 firefox.exe 4960 firefox.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 5964 vlc.exe 5964 vlc.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 5964 vlc.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe 6864 taskmgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
firefox.exevlc.exepid process 4960 firefox.exe 5964 vlc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
firefox.exefirefox.exedescription pid process target process PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 3532 wrote to memory of 4960 3532 firefox.exe firefox.exe PID 4960 wrote to memory of 3500 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 3500 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 1776 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 5352 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 5352 4960 firefox.exe firefox.exe PID 4960 wrote to memory of 5352 4960 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\v2.exe"C:\Users\Admin\AppData\Local\Temp\v2.exe"1⤵
- Drops startup file
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:748
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:1792
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:312
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.0.1582776055\800801600" -parentBuildID 20221007134813 -prefsHandle 1616 -prefMapHandle 1608 -prefsLen 20747 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0874d4e-51fc-4f91-a15b-08601cc73e80} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 1748 200c0bf8d58 gpu3⤵PID:3500
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.1.826962335\1922165798" -parentBuildID 20221007134813 -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 20828 -prefMapSize 233444 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {71624092-66f7-4582-a148-2c39337ad5a5} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 2120 200ae3df258 socket3⤵PID:1776
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.2.387807622\1993426764" -childID 1 -isForBrowser -prefsHandle 3164 -prefMapHandle 3160 -prefsLen 20866 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bd021b9f-fe29-40c7-9b79-0959bfe401f7} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 3008 200c45a6458 tab3⤵PID:5352
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="4960.3.161137493\104533494" -childID 2 -isForBrowser -prefsHandle 3120 -prefMapHandle 3324 -prefsLen 26109 -prefMapSize 233444 -jsInitHandle 1060 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a7ac084-d285-418e-8a44-433a8bf89160} 4960 "\\.\pipe\gecko-crash-server-pipe.4960" 3344 200c300c958 tab3⤵PID:6928
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:6180
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
PID:6484
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:4464
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6864
-
C:\Program Files\VideoLAN\VLC\vlc.exe"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\Admin\Desktop\TraceJoin.M2TS"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5964
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:5984
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\8x2iovw-readme.txt1⤵PID:6308
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5fd7e2a978a5d06476928994a8f051c23
SHA1d294e077fe02c6f099e95f4222838e5152173c98
SHA256fd60ae1d59018894cdac293fb61e222ba62f91cdbb044d81b7b6b70ec3a3dbb7
SHA5123e174e287f0a2f4ee5354562638b701db1f1453127b841061fd9f4bd431e398317739be675470cb61e37293dc68b69633163fb2d62324ddbaab6ea046aa83fdc
-
Filesize
224KB
MD5bfa880d0eeb3b7eadb693ec03584cb63
SHA1fbb420dbf493fee800cac93e3394ee06dd12f275
SHA25697303e630a2acd9f06a5fd02aaf02d17f0f308d46d9f370e54ff8935d4b43abe
SHA5124f53093149bff6f91183d7585694c941b09d464a2a5e737a3a13b151e886a1d51e043a79b8d09f64bedded3194677894a9bcb570f78eab16a003c45c16e108e4
-
Filesize
32KB
MD566f2c8cdf5085f5901603d92e90bcd68
SHA1248e63ff7017887b47452adde89a333fea04687b
SHA256e11d6406659c93702958e480a21f9588c4515ba46d401feee70a86edcec4c695
SHA512373786a67b54470656ecbe59fb25d2a9c8b327fea0df49623f0c639769d163459f16bdc3fc3dc3ea5d5ffa7b295726a7f16bb4c7648bc39515994b43f6938899
-
Filesize
200B
MD5170ce2c50c8496fe8d0d2febfa08c06e
SHA1f4b26b8d9fec9a9a7514b8c66a427d021510a375
SHA25675f315800fe5caa702c2fc68b93dde1749fca7fc4d68cf5b08ea4bcd8dbf8387
SHA5122077c20a8d1840932f09d64233dae145288c30c7c3159fa5c1933928ce9a8710077c7027dfc78efd1062510a0e53f37a4342228f2d845410103642c4c45ec786
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD50be4229ea686dcce242df609856208bd
SHA1d3b0da379de81dfb90e74caef483478ce65e00f6
SHA256ab8e91b595d296b67ab9a89717c14bc8e12098a1ee05a7e2beee08f72643c767
SHA5124a040b32e49e1b58aabbf81116f2c7ad8717d120f25ad6f8f1a2c74cb4ac83a36579ddf3f7598843a2405a822ba524cdd275f46586d71f2b45a690c709c0eaa9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\pending_pings\26a6ab26-f133-4863-a10e-c182ad2b8c79
Filesize746B
MD55baf3a50fd216603fa58d13222469475
SHA1de499905f2e6f983b30f920f980052c73dcd5e92
SHA256f594102c071763a38bb0e7348a0f4c42d0b9fc35ffb69f8895d824ac01a777d6
SHA512ea832e1ab96709cb848682bd374b7c3a8552553f45c8b2cca30091b32eb6800272c4ee860c37315c415c941fe19d62a9501a9654a13968c027fc3026164639b7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\datareporting\glean\pending_pings\6a5c630e-2265-4476-a127-b7953ee3cba5
Filesize10KB
MD54165b314b4c6339a1a7ac5c33b17a26b
SHA1bbb15bcb439aa87f29f69f77ca5491c28436d77d
SHA256db7cc8479c91926226ca774805de324da9c1af953e820bea4d451d348c4ee6e8
SHA512ec04cf2ae76f1544b9481a6cf817c8a17999bd3c926cd42a3bc489186b4a7b481f54f6cf8a45a16be5c85d97442a233bc9fb6c4c6b2e7947fb6534525b48f0ed
-
Filesize
6KB
MD5ab46f1aa54eff373a2871fcf62d5bf26
SHA1fb20c8cc24b522c7d1fcbe23101503cfe271d48d
SHA2564ba07f71856fea0692b8e745a6cb1b78c6b27a2b36daaee154ee2faa030d3f56
SHA512cc33e900545d83c744fc8260e5ef76394044c1139325ec975650795aebe07a1e52a3b97408f99a084f89646c389a44ebdc0dfd95037e95c0f50bb82e3c212469
-
Filesize
6KB
MD5531e245ce4ebf51e1b2847c8458aafe3
SHA14d5607eddd2aa15043f81ca6123b63fc6f51d1f8
SHA256ef48545375ff3070c68ad50a71dfba81ba22402f4a306d15e4957282df1a7782
SHA512c312975cea2cb00be387ad51bad00b6f730d50d8615df1cc5f0c547eb8e812e5463cb7725987d4e85fd4ecdf6ca06014b7c8e296669d4435387b54405a91a181
-
Filesize
6KB
MD5d5af7e8435dd8eb42e8ca28a6c47b6c4
SHA1e65cc8f09887a7396ab018865b0b500aaa7b7aeb
SHA256e02f17403507b330c346935c0204650ce5a3d95ef09a821ecd0f5e11da570f73
SHA512c5cfbc4a6062a5fcd15cd0b0f4578021e7a6ad153c69b7bc3f5762aded69b11723c86eede4d24cb88855a8eac76a22d7de7f71f6c90c8442536b1d20b96945d3
-
Filesize
6KB
MD5034bd49488dddba1cf7b489d846aa0d9
SHA177699aa72691220d67708e9be190b2e0b401e7a7
SHA256760f68647c08f79ba1b8086706bac1d6ca08f16132f77dc648e65e23fd41394e
SHA5120fe491ed42470d3aa2c67e73ed23ae19cbfff99b7c49177a8fa7c159e3dc06b70a40afacb25b3ee74966f3619c6363df765eded285ec689163b790d4af669c62
-
Filesize
64KB
MD5deeced8825e857ead7ba3784966be7be
SHA1e72a09807d97d0aeb8baedd537f2489306e25490
SHA256b9f022442a1506e592bf51284091a8a7fe17580b165d07e70c06fd6827343a54
SHA51201d303232d6481af322137b44fef6c2a584f0643c48bab2836f9fe3193207015da7f7514fe338500ae4469651e3d9618293858ae507e722198a249257677099e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\sessionCheckpoints.json
Filesize53B
MD5ea8b62857dfdbd3d0be7d7e4a954ec9a
SHA1b43bc4b3ea206a02ef8f63d5bfad0c96bf2a3b2a
SHA256792955295ae9c382986222c6731c5870bd0e921e7f7e34cc4615f5cd67f225da
SHA512076ee83534f42563046d25086166f82e1a3ec61840c113aec67abe2d8195daa247d827d0c54e7e8f8a1bbf2d082a3763577587e84342ec160ff97905243e6d19
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\sessionCheckpoints.json
Filesize90B
MD5c4ab2ee59ca41b6d6a6ea911f35bdc00
SHA15942cd6505fc8a9daba403b082067e1cdefdfbc4
SHA25600ad9799527c3fd21f3a85012565eae817490f3e0d417413bf9567bb5909f6a2
SHA51271ea16900479e6af161e0aad08c8d1e9ded5868a8d848e7647272f3002e2f2013e16382b677abe3c6f17792a26293b9e27ec78e16f00bd24ba3d21072bd1cae2