Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe
Resource
win10v2004-20240802-en
General
-
Target
54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe
-
Size
1.8MB
-
MD5
b46656c491ab97abc970c8d83c3ed741
-
SHA1
a03265debde94a6309d656b338625304615a6d0b
-
SHA256
54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840
-
SHA512
10475ac84b920b97e11ee4f280ff05ee6bb8739fa1a2fd8bc265639a931986ccdc94bf155ed591937d918b8f72a5162cbc5fc40110ebcdfeba84fea51db5683d
-
SSDEEP
49152:xD5voBD6+lCU0puqvPnNV+lSLUfhjbegMVgbMc1v:xDyw+lxm9wreYAc1v
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
nord
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 472d53f47b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 472d53f47b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 472d53f47b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation svoutse.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 3dd4ef4a34.exe -
Executes dropped EXE 6 IoCs
pid Process 4196 svoutse.exe 452 472d53f47b.exe 4216 3dd4ef4a34.exe 6104 svoutse.exe 4564 svoutse.exe 5548 svoutse.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine 472d53f47b.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Software\Wine svoutse.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000b0000000232f7-46.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2332 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe 4196 svoutse.exe 452 472d53f47b.exe 6104 svoutse.exe 4564 svoutse.exe 5548 svoutse.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 472d53f47b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dd4ef4a34.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2332 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe 2332 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe 4196 svoutse.exe 4196 svoutse.exe 452 472d53f47b.exe 452 472d53f47b.exe 6104 svoutse.exe 6104 svoutse.exe 4564 svoutse.exe 4564 svoutse.exe 5548 svoutse.exe 5548 svoutse.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1904 firefox.exe Token: SeDebugPrivilege 1904 firefox.exe Token: SeDebugPrivilege 1904 firefox.exe Token: SeDebugPrivilege 1904 firefox.exe Token: SeDebugPrivilege 1904 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe 4216 3dd4ef4a34.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe 1904 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2332 wrote to memory of 4196 2332 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe 87 PID 2332 wrote to memory of 4196 2332 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe 87 PID 2332 wrote to memory of 4196 2332 54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe 87 PID 4196 wrote to memory of 452 4196 svoutse.exe 91 PID 4196 wrote to memory of 452 4196 svoutse.exe 91 PID 4196 wrote to memory of 452 4196 svoutse.exe 91 PID 4196 wrote to memory of 4216 4196 svoutse.exe 94 PID 4196 wrote to memory of 4216 4196 svoutse.exe 94 PID 4196 wrote to memory of 4216 4196 svoutse.exe 94 PID 4216 wrote to memory of 3544 4216 3dd4ef4a34.exe 96 PID 4216 wrote to memory of 3544 4216 3dd4ef4a34.exe 96 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 3544 wrote to memory of 1904 3544 firefox.exe 98 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 PID 1904 wrote to memory of 2392 1904 firefox.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe"C:\Users\Admin\AppData\Local\Temp\54d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Users\Admin\AppData\Local\Temp\1000013001\472d53f47b.exe"C:\Users\Admin\AppData\Local\Temp\1000013001\472d53f47b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\1000014001\3dd4ef4a34.exe"C:\Users\Admin\AppData\Local\Temp\1000014001\3dd4ef4a34.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23602 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6761acae-d25e-416b-bef7-326b75677720} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" gpu6⤵PID:2392
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24522 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c8eeb6a-b77e-4edc-931e-fffd168f0ec7} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" socket6⤵PID:4516
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1320 -childID 1 -isForBrowser -prefsHandle 2816 -prefMapHandle 3116 -prefsLen 22590 -prefMapSize 244628 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {907d9c9a-5de9-4631-b0dc-ddf0f66d683c} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" tab6⤵PID:4472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3652 -childID 2 -isForBrowser -prefsHandle 3692 -prefMapHandle 3688 -prefsLen 29012 -prefMapSize 244628 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0f9eae57-a92f-46ed-bc70-b51d27632621} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" tab6⤵PID:4144
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4828 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4764 -prefMapHandle 4692 -prefsLen 29012 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {53e0a2e7-cd81-41aa-8af4-445d4956e662} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" utility6⤵
- Checks processor information in registry
PID:5552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5324 -childID 3 -isForBrowser -prefsHandle 5248 -prefMapHandle 5224 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57246bd7-1027-4d48-a46b-1573c0a6c601} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" tab6⤵PID:6116
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5440 -prefMapHandle 5216 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f2c847dd-4df9-48d3-8cc5-e077c1acece4} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" tab6⤵PID:6128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5728 -childID 5 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 26989 -prefMapSize 244628 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2df4f4d1-1eae-4f55-b280-4f11a94520c4} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" tab6⤵PID:6140
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6284 -childID 6 -isForBrowser -prefsHandle 6272 -prefMapHandle 6236 -prefsLen 27039 -prefMapSize 244628 -jsInitHandle 1284 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b8ed9b9-ee70-4c78-b43e-1b884be87024} 1904 "\\.\pipe\gecko-crash-server-pipe.1904" tab6⤵PID:5392
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6104
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\activity-stream.discovery_stream.json
Filesize30KB
MD5eb57238e1726d486a1730d663c9d47f4
SHA19a0f8f0454f8836e661f17999e95baa135096502
SHA2560fb23761a65ddacfb28f2966f103dd74c7597d133aba007c2202840e47b45c03
SHA51244075cd50b0b3442657a6acbb308b80827f503d8ef2c039c596d92b046e71f256f80551368dfce515dee7b025f653444849bb0a1ef44b45b3b050da335560edd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD51434921e75e832800e60cb0437a35efd
SHA11e05e550594ca78148e0568802bee30e808ac76d
SHA256c7326d836e0c26e1855b3ad2017ef56113df546f422919dfc520c995030ffdfe
SHA51261fab861cfccb5e11d4903a6ca80dcd2eca43407999a05fdb9cc3db5563700940f1d7b9aba4c878fd6f565716fda394e0279eec1edb38b92f14093beb9976d7a
-
Filesize
1.8MB
MD5b46656c491ab97abc970c8d83c3ed741
SHA1a03265debde94a6309d656b338625304615a6d0b
SHA25654d95aea41226af0fee9eb916530244061fc02f0227d36604fb8fa307d9e6840
SHA51210475ac84b920b97e11ee4f280ff05ee6bb8739fa1a2fd8bc265639a931986ccdc94bf155ed591937d918b8f72a5162cbc5fc40110ebcdfeba84fea51db5683d
-
Filesize
1.7MB
MD517abc9d745f45caf5d09d735e9545148
SHA12deba4d16169f6a34c8f04113659be75bf4c0541
SHA2566ad985ac636b93d6c040972403b0de2f643614483a4157d897d2ca310917fd77
SHA512970d73517f9ec7cc2b14452354706532bf9da9c8e510760747bbbfb14e731ae2b38370e4a244ec14425a5141929e09ffaa002dd1d11a198feb76ee7e2110d8c5
-
Filesize
1.2MB
MD5bc0cd249cf86c9dfd66eebecf65c02fd
SHA157b288a8dfb26b60909146b177cf404cdda05694
SHA25670f47342dd1a980b93d21aa0ec5fbb54bc671cafb91c148bd5d90c702b47f97a
SHA512d99020b0b4106a0dd573bc03e7246adc8633519f3f58d96c7716cfb280fa6985dd7a12e6ab3efababa65de4bea08c4f27cef008b059c2a2ca4a774e3a947d97b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\AlternateServices.bin
Filesize10KB
MD5aee85893f28ee810cbe77bb5f18f5822
SHA16add3cf4c16c36eae9521da076a3ed046635f20b
SHA2563f9e5127ce5061afb56e61637d492f8d6592c2707393e59064251b6dc6034a9c
SHA512cf57bd3951b24502aecbc287170ae87c7d960ce25ab0ac3e4de1e23c5ff6b22fe8c67bc3e44211b6c8824c4d8a11cb5b637cc4f03c21ac9c91e01f1c5ec867e3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize16KB
MD5cecb5f5c0db5622cb921869771e13b2f
SHA1eeebdcda100df0d17f12928493ce8245f5af8131
SHA256ec05b6d9362c6d936cd99d9ed097754303a539c640bd7bb401cfffc4d1f9f3ec
SHA512b3d622a62f8a9a7a5f8fc50bc2a6430bdafd6309ce0a9a51f5ec8667c6ecc56b207fd5ca83f4b4daa5f4d3803ef02f5d6ecf69da445e2efd7b2bf3be20eeba89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54f49635f768309e55016dec98cb4113f
SHA1df19de0094a7b307c36ead61735b8ebfb5f7a22c
SHA25667f896e8183cfedf6921b5789477d97228a347e041f2016097b8399eed6080de
SHA5126ff55913078ef6b4de8f46c7545cf892b61d5b76d4ac8677d37797fd9f200bc9a63a52b997e0e085146a06454ceb2dde2540aff8b7b71fa21e44245ce24e5008
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\pending_pings\0c7486c2-d60f-48e7-9b0d-7fee3e283245
Filesize982B
MD5562ccb051c08e96acf9d1fcec43a75a3
SHA1612b7fa6f53640e1d45d144aa3d38bf68a6dab5d
SHA25601725a7cb7ded3592f6dde420e1bbc31d3f6e12386f4a78b0c7590360a0ea74d
SHA5120067523f5c49a583f7c332e64e44a8d6f8c9613629064a96a943e5418763329fbdb806481268097566137f282a869fad7d8321185410d1fdee3f0fe7bc2ae74f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\pending_pings\afd632b4-b299-4c4d-8050-cc84cfb01e9a
Filesize26KB
MD52e32910d5faf4545596202fee126ff3e
SHA102c317aef9a9a438ba99c76e87a98f0e2340599a
SHA25689fdeb9f1cf047c81731fd39f55f953b163369ea5ce0a1b417f4596cd9dd7ff2
SHA51262920fbfa2f872ccd2323f1bcf0c6ff806d4bf86184713dbca168f2c4d715f9e3bfc4947c6fde619c3e5c696d24976f517d9230b637f93ffedd3a728d546bf86
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\datareporting\glean\pending_pings\f71d8849-47ad-447e-89f6-4e61768c779c
Filesize671B
MD5ace755bc196685f3bd39a28b385e31d7
SHA138b3af45ae9090fac65db4d4c4fca3a13153808c
SHA2562efa1d2d88b0fc211a64b62dd8d92cc24193df365cb4a4d990a4807d492dd97d
SHA5125aa24137a0c2ba7d648c017f64e0bf37d7b52d902c1a8fcc4eb84a8b918b90a559a16ff66180ec4b7abc1d7ccca4663fef0c011c24044def359f1c15661cde73
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
16KB
MD5e1e1021ae9c6d4f8d87118cfca199b37
SHA1ff3c2e5e2734b05494e2535d47102853af04548f
SHA256017bcef4936df7645a5030db07483038d94bf537fdbb838244fb596a156516a9
SHA5124f6672d8e0afc8c2fd075c8e5518de4c7578ebd05773cc0623baae4acd464ac772ab34a9637403c8438606289586235a7c62645c025f3147a203d492cf10a6e7
-
Filesize
12KB
MD5a486cf13c706f3caf5db5832fa2533ff
SHA14be5d6a9a54393498a79212adb461e4ad24158f2
SHA25600d1c628567e8fa38a250d5c8469488daf1ee03d20649907847198e49129b8b2
SHA512bce40573c72830d8f24c5a36d947785dfd8b6dfd6fc5373b08d0c27d8c5aec81983d5987a8840336e9edf43686671d463ed8269a9dcb4f21bdc79d695af165f0
-
Filesize
11KB
MD5121a3d2215c33bb4242f3836301d9ece
SHA17a86483cab8058f02edba7d6b085384978c01a6f
SHA256bd3a9d438d75c94daca8c71f60d4196ddb3576a9fbad92e03cfe3d08abb33ac7
SHA51249aa68d0a8dbde040d205bf9e7e234a81e9eea42b9b24f6e53bf36d85e26a89d4e99654dd757ad9381007c3d4e7ed3b7e5e45e84d4b58352962b309206b0858b
-
Filesize
11KB
MD5d1a6b3ae1a725f4a8df77fd169ed6a61
SHA16f3c26c4c8213d04192db2614e8e078c21ac4d4a
SHA25629f951d5534cb5a0befd372dc378ee3f9772a13e774fbfa5335cba6d2e66b0b9
SHA5124acd7bd647506b7638d7e5cd3ef14835420b161cc64095136f46b29bdf3f4e5cc4e6871d4f0382cf9dcf0bdf2ce8e7e1cf3494ad01ef3ffe15c7be7233aa1fc8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\c5dqhm7h.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD552b4afb86b8334379113312fabb379a4
SHA13dda5c407d073185b1619cf296448798c154fe5f
SHA25675f8eef87674baa4c98e776357fda529b6915ff2e8cd3c606191ca23496c0352
SHA512130a531afad81e105a6a3ed4ac0bd0b4ffe52e8aafc097ea6cf35c6a58e3f23dc160ddad91c0f5fa5d12723e07b9156b4689aa7e20d98d2fa5d3a082a03c97b7