Analysis
-
max time kernel
46s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17/10/2024, 15:03
Static task
static1
Behavioral task
behavioral1
Sample
New folder.rar
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
New folder.rar
Resource
win10v2004-20241007-en
General
-
Target
New folder.rar
-
Size
3.1MB
-
MD5
0f7e60c821d2fec96a19bf6278444ff6
-
SHA1
ae0aeae53a8df4c5bd7f742812e2e0478cead4e1
-
SHA256
085547a82141160dbab3f8d0b861dd506afd9b8c9b414d3506606f0d3c17a278
-
SHA512
71681734b8d908b3346739848854c4950a2b6105ec1309495520eda3b3bc2c1bbcc866e98fd9f97a1c0ed6540add10c307f6888cf8d32f21d62725af68c9bd03
-
SSDEEP
49152:peQMaLXbjNhLFnY0jCFwKq6C1A6VWc13mIL0e2Zc01eq5r8kIqAnPbihxh:pNMeY0m5YFVvFmc0e1Pq5dIrj4xh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4960 python.exe -
Loads dropped DLL 1 IoCs
pid Process 4960 python.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3872 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 3872 7zFM.exe Token: 35 3872 7zFM.exe Token: SeSecurityPrivilege 3872 7zFM.exe Token: SeDebugPrivilege 3272 firefox.exe Token: SeDebugPrivilege 3272 firefox.exe -
Suspicious use of FindShellTrayWindow 24 IoCs
pid Process 3872 7zFM.exe 3872 7zFM.exe 3872 7zFM.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe 3272 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3272 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 4960 4844 cmd.exe 107 PID 4844 wrote to memory of 4960 4844 cmd.exe 107 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 4764 wrote to memory of 3272 4764 firefox.exe 109 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 1064 3272 firefox.exe 110 PID 3272 wrote to memory of 4576 3272 firefox.exe 112 PID 3272 wrote to memory of 4576 3272 firefox.exe 112 PID 3272 wrote to memory of 4576 3272 firefox.exe 112 PID 3272 wrote to memory of 4576 3272 firefox.exe 112 PID 3272 wrote to memory of 4576 3272 firefox.exe 112 PID 3272 wrote to memory of 4576 3272 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\New folder.rar"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3872
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1428
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\Desktop\New folder\Sigmastart.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\Desktop\New folder\python.exepython.exe sigma.py2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4960
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2004 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9bfc4c11-3999-4dd8-a8d4-a2866e8de2c9} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" gpu3⤵PID:1064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2408 -parentBuildID 20240401114208 -prefsHandle 2376 -prefMapHandle 2372 -prefsLen 23716 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4ae1f97a-75c4-4fba-a66e-7b04f3060cc1} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" socket3⤵PID:4576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 3228 -prefMapHandle 3224 -prefsLen 23857 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9dc3b8e2-93bd-4070-b937-4baa53471440} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" tab3⤵PID:1572
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -childID 2 -isForBrowser -prefsHandle 3852 -prefMapHandle 2740 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a9b0a3f-309a-42fa-9b73-8d8740bc2168} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" tab3⤵PID:2296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4988 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4864 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {099e0496-811b-4763-a5f8-06049ca85903} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" utility3⤵
- Checks processor information in registry
PID:5628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2704 -childID 3 -isForBrowser -prefsHandle 2716 -prefMapHandle 2720 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {29b924f0-5004-42d1-8c5b-9104c801a95a} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" tab3⤵PID:6036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5388 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 4960 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b1df03b-507b-4546-b137-5eda6f238f46} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" tab3⤵PID:6044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5844 -childID 5 -isForBrowser -prefsHandle 5732 -prefMapHandle 5740 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c13b2a53-1523-45f2-a739-222f688fee37} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" tab3⤵PID:6060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6152 -childID 6 -isForBrowser -prefsHandle 6140 -prefMapHandle 6136 -prefsLen 27211 -prefMapSize 244658 -jsInitHandle 1144 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3a7b73d-6fe8-4093-a455-516a7418ada2} 3272 "\\.\pipe\gecko-crash-server-pipe.3272" tab3⤵PID:5424
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD52398d471a78af5646793dc321bfeef5c
SHA1b8512a024ead48074a6ae42eabea4f86f23d93e4
SHA256b4f4c7cab18b684a0ce736f4ae318b5a4f8ca06f83d2130e1f682534d0b7ce69
SHA512b1f5397f01f870066c984fe9cfb148aa6a552de15e6c9329344f7325a1c9864efe085c3e8c7ddcdb93deb72d90434d61e02dc3708ad7969955e1d8cc97819bab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\thumbnails\4b6fc89c19df46f6bb087850b7d34257.png
Filesize6KB
MD5d66ef158c91bf2127b14398dfcd4917d
SHA1b8385692edacceaf509bd5cf355ad72d8467a7b5
SHA2563c96a4d61bcfdef1e5e947bf9af4999d490a088a022179cf1bb6c0c01cab5664
SHA512c2e750331f329ebc8bb9f560b580df8ae7d5752b2e1ee8446cb32fa0e1c33e12224dba0d6d075e53bb20a6fef244cf71b92541f40b08d4f23bf9cfe70b6afc5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5b269083356b825fc9ab9f33ca21946f8
SHA19828e2f7201b4ef624db9a2a656506a9691e4ed3
SHA2569290bbbd78d9c62cfdda4423d872bb8b5eb6de4d3ec6451c5234f6252abf672e
SHA5122813fe41ca79ee7e655a3ab8592d4c594ce4dca98c947ab3ab576ceae76da97acbbf626b2b0becedd5612636c1db07934a9a3284b00e68b12d290c7e11a80159
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD55ff53c07f3460b538440cc11e23d5a58
SHA11946c85e8427949574c8526fa6f7fc998cd33d85
SHA256211c7fce028b15b6d13082f2f54d1223e97c1bdaa0400d795d7d408eeeb93ac4
SHA5128e56e357f2972fc6a47219188ea7643395564cff53978af564b7a3b9057e8fd131124dfd09aea38b0c626128869d90906109424db7650b7f7385d4086a661754
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\18abe904-c923-412f-9654-e169e21dda49
Filesize671B
MD5650c598e1bf07926c2e31c128b28adc2
SHA15fb8f3caacc89cbcf6c4b607922fc64ccb229198
SHA256a4ac84a0d82696e00bea9df085e815372c6fcb10d955364e85d419cb6bb54398
SHA512c3eb67d4aa4ea2006191b33c5c86b990dc500ca0ebfade4f7712a9da94277ce69626176403f428f06ff5bf67fb3eef0bf9b3979fd68d85875b400a37d3b5e830
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\935c9269-e7c1-4dfa-8a9a-c32504f0d71d
Filesize982B
MD5c724014c6bcb5aa023ed85c4c85a4f39
SHA13cba98e67351041f05ae173a06035328ffd1d04f
SHA256aa4983990d35d6b8a8635b1c8e3bce9bf9f0bcd9ea1a8da689ea7422a1cbe355
SHA51286eb8153c6e7987931c9df8785f8f1b9c8c11f83431ae153a30f424d5ffc6e152667f1b3a26cbfc65fa4ac98c512b79c2f26d26a4b2fc672d66758e4aec46953
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\a21f5929-14d6-4a50-809a-8fd8fc42450b
Filesize27KB
MD5f55eead3dddcda08a646aee33b05a511
SHA1aa75bd6e3dd71a4b10fef08b12f14b3980d94351
SHA256d52cfedc97dd8f3a52b8da2615aba519303fc8e89e78b859fced8416f46d8cbb
SHA512c35f6586855e45214eb6fabc3ab7e4d002adfa236bfc937951d0d6a9b7074043bbda6250ba0bdb1809ea0727d78622383a8ddbff4dad58cae99eef2bc7544d84
-
Filesize
10KB
MD54cd9c271bf904e514aad2e08fb2c93c8
SHA132baec8e1f778ffcb2cd6078a54fbd55ba22bafe
SHA256cc2e1363bb243651a7f9fc39df3e421298a9c1eeee4dded5ba4025f3c692335c
SHA512a3cdfcee3ab23ee6722add8e063154293e1ad76001c80af584745a2811a569062fa8b0c0f8ae52bf85fedf27c086c828feca15d5fee0db05941b544398b9622a
-
Filesize
11KB
MD521b3f516e0ac49d6dda57406ed438c9c
SHA1e104eccefa2e5ff9468b1d1f355410f2b335d5a4
SHA256847be22ba041017b02ed67f6e77797437cf82cb9c1b2141350c45dadd2401d4e
SHA512c63870ba2852bf1ec27fe44654d520c7309ed19725f014c8f303f71f3afad06512b5e4806882bdd0324e17d5fad05d8c4cdbe97ee40045020a95a479435a24ae
-
Filesize
11KB
MD50a3b2e4c9e64f6fb069fa5da783f1a5f
SHA10cdb2560b81dee7fd10367f480a9387c1fe4b915
SHA256ca4780b4841e250211f7166531c381f3e7f108b32630a32b1d968a5400bfa0f9
SHA5127535eb399a9e92fb45e11804fea97af635a288f095cdd1463d127ac7a6b42028e44c4e6997d389865d08b9d8d76de2f221703962820dfb0c3cd081fe7a63fdc1
-
Filesize
37B
MD5854b63362b840a3d424b346f4fc03325
SHA178ef80835006eb640e2c423984d5056494c672e8
SHA25658efc73fb9bcfb8ec89656227db2be0d08990b8d5e34b7bb857f1cbdb5f76879
SHA512ac2b14cba5fb1e78fd6a261e694cfc34e7efe499bfb9a02a345edbe5193cb20ae92438a15a538adfc307dc3883d5e0c2554dba39b1ab9a93958e6e5d6e6cb140
-
Filesize
101KB
MD5c6ed974729d66dc7877bde3e966b460d
SHA1d61806703f7b6d676bdd654e329c2e82348ac86c
SHA25662ebc90a2884bb63a0cd67e789cafdd51e771eee043587e2354327b4ccc9bb05
SHA512a865fda1b619674372871ee44a33d233f6025026295f6db896530bc6282dcc8f1f921c117570be7fce4b833a85dc02716d236a8688338e0bb2def256ed127bdb
-
Filesize
5.8MB
MD5b9de917b925dd246b709bb4233777efd
SHA1775f258d8b530c6ea9f0dd3d1d0b61c1948c25d2
SHA2560c0a66505093b6a4bb3475f716bd3d9552095776f6a124709c13b3f9552c7d99
SHA512f4bf3398f50fdd3ab7e3f02c1f940b4c8b5650ed7af16c626ccd1b934053ba73a35f96da03b349c1eb614bb23e0bc6b5cc58b07b7553a5c93c6d23124f324a33