Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
18/10/2024, 10:15
241018-mageta1eph 818/10/2024, 10:14
241018-l9r5xstgkl 318/10/2024, 10:12
241018-l8j3xs1drb 3Analysis
-
max time kernel
91s -
max time network
88s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
18/10/2024, 10:12
Static task
static1
Behavioral task
behavioral1
Sample
iVault.py
Resource
win11-20241007-en
General
-
Target
iVault.py
-
Size
746KB
-
MD5
08990be6640354d6c8558cf88c3f18e5
-
SHA1
a92a9751e57b81254f09a474f9e53367f1fc9306
-
SHA256
12d5eea4a11a119a6d722aecae66ff0b71a24cdfaefa42a34cf53d5a06415600
-
SHA512
7717a14bb9446c5f74f22d8cc33ac166a06cf1c75cda7eb9279e0779cda9a631c376cbc5d13e8d9ff7b46008bc12ce139f0c7f8b94a11f7b2f498f279cbe0a52
-
SSDEEP
768:fQ9esPysAEw6S6bWgKDE0chEgfaWE2/ibICxEmSR0sUR3yHwkBzF4BXUu2lcwZi3:RsPy9Ew4bWhRgfaXmmkw5ciwZsb
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe -
Checks processor information in registry 2 TTPs 14 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings OpenWith.exe Key created \REGISTRY\USER\S-1-5-21-2499603254-3415597248-1508446358-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3436 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3576 firefox.exe Token: SeDebugPrivilege 3576 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe 3576 firefox.exe -
Suspicious use of SetWindowsHookEx 34 IoCs
pid Process 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 3436 OpenWith.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 4952 AcroRd32.exe 3576 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3436 wrote to memory of 4952 3436 OpenWith.exe 84 PID 3436 wrote to memory of 4952 3436 OpenWith.exe 84 PID 3436 wrote to memory of 4952 3436 OpenWith.exe 84 PID 4952 wrote to memory of 2704 4952 AcroRd32.exe 87 PID 4952 wrote to memory of 2704 4952 AcroRd32.exe 87 PID 4952 wrote to memory of 2704 4952 AcroRd32.exe 87 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 2472 2704 RdrCEF.exe 88 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 PID 2704 wrote to memory of 1624 2704 RdrCEF.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\iVault.py1⤵
- Modifies registry class
PID:4080
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\iVault.py"2⤵
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=BFCEAA94CFFC16FBEC698309D30DD6DB --mojo-platform-channel-handle=1740 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=6AEC987EA7B104CAC21DFB4595C50394 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=6AEC987EA7B104CAC21DFB4595C50394 --renderer-client-id=2 --mojo-platform-channel-handle=1752 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=94E3B1DAD5756DF6279C8E0838BCB668 --mojo-platform-channel-handle=2336 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1376
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=9DEED13052C61BA35FD77661DB42B1E9 --mojo-platform-channel-handle=1756 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=F62B7B6CE9ED93A6C7C0525952403799 --mojo-platform-channel-handle=2352 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3676
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵PID:2584
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3576 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23678 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddd83ad4-0b32-4cc3-b289-fdb5f1d41bae} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" gpu3⤵PID:3860
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 23714 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {773017a8-c024-4e86-9674-b4ba0a360863} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" socket3⤵
- Checks processor information in registry
PID:4336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2860 -childID 1 -isForBrowser -prefsHandle 2872 -prefMapHandle 3040 -prefsLen 23855 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {392e6904-74da-4eda-b148-9053573e9c2f} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" tab3⤵PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3808 -childID 2 -isForBrowser -prefsHandle 3784 -prefMapHandle 3780 -prefsLen 29088 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2d0e48f2-ff4c-4cd4-8e12-32f2db6ebf00} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" tab3⤵PID:2920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4692 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4680 -prefMapHandle 4672 -prefsLen 29088 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {db607352-8201-432a-91d2-7307fb1f0e4f} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" utility3⤵
- Checks processor information in registry
PID:2948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 3 -isForBrowser -prefsHandle 5372 -prefMapHandle 5368 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f63bd426-cc39-4848-aa80-445ea2ddbb0d} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" tab3⤵PID:1208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5532 -childID 4 -isForBrowser -prefsHandle 5608 -prefMapHandle 5604 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e590c26e-edfb-4445-b61c-8d90daf1e693} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" tab3⤵PID:1232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5504 -prefMapHandle 5508 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1320 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0867919-4e98-4c62-8c01-a424ac841fd3} 3576 "\\.\pipe\gecko-crash-server-pipe.3576" tab3⤵PID:1124
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5efb1ee8580d3cd5dac1d7528a8734459
SHA1969d0251ffb4daaecd3938786c9443fbfd88ec72
SHA256db554f9b50267642aa4e8b4bc4728692c3ae064b8bec883c83dcf890cdf0a030
SHA512c3687a5dbefbddfdbdcdab74f5e1def9e37cef6636e1b0a0791a85e6eed37e3147f41e630eff242f30b6da420c97b472026a35bda90b470cd89296820ea99f08
-
Filesize
36KB
MD5b30d3becc8731792523d599d949e63f5
SHA119350257e42d7aee17fb3bf139a9d3adb330fad4
SHA256b1b77e96279ead2b460de3de70e2ea4f5ad1b853598a4e27a5caf3f1a32cc4f3
SHA512523f54895fb07f62b9a5f72c8b62e83d4d9506bda57b183818615f6eb7286e3b9c5a50409bc5c5164867c3ccdeae88aa395ecca6bc7e36d991552f857510792e
-
Filesize
56KB
MD5752a1f26b18748311b691c7d8fc20633
SHA1c1f8e83eebc1cc1e9b88c773338eb09ff82ab862
SHA256111dac2948e4cecb10b0d2e10d8afaa663d78d643826b592d6414a1fd77cc131
SHA512a2f5f262faf2c3e9756da94b2c47787ce3a9391b5bd53581578aa9a764449e114836704d6dec4aadc097fed4c818831baa11affa1eb25be2bfad9349bb090fe5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\odgo8eah.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5f18ba5299f97f017d18c0e300702a887
SHA189bf4a9111c8ee6f486a53b3c6da29905293f8c7
SHA2563dccc9ae0624a054c47920abf7c61efe6d298f000e39a3ee2d211b33c028b50b
SHA512d1a63c6bf7a889c5a613dc2b9edc6dbb9c58a5e0f2516a43490d4b87f4ca7b9d506f9b0aaacc6805f93bbd3b9e0f64c1e7e2b792f3a8067491d0a1c22f74cc9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d64c01218a8c36e4a5495dbcf5299045
SHA1cc495d29313942363dbb1b1a3bf827a24ad59149
SHA2564829082513011e20e45180c7988585a66689987e2a52c40bc9088ef6628dd220
SHA512a15f8080edb21cbce351a0097373014ab7ebf45ee8720a12c9c09921ad2f6f0ec674a639c6e64dc768d295daaa9eb7ccb36c8cd8f8e66613a94485494bda8087
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\51091746-cbd9-4e10-9210-7e97aeb6de55
Filesize671B
MD56d82fdd4dc0c13203bece8983e0b6c06
SHA1d7b48b74d6a0b22f98baa28f867be427dc2aed96
SHA256651edf657c1c675c40dc07b73e8e05a6098acbbdf51509e678a64ae434f21ef6
SHA512017761b3ef96640e4140389bfa3dca11ca6747fe24bcd3cdb22f330c279275cf6f689734202a79d0ae26b5fd383e3ccd41c50411b7109c324412f666fec70a6c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\85be2366-5cd8-4441-83c7-a6f8e38e48d3
Filesize982B
MD5dc83e0b6082d96798c2cd657ad9504ce
SHA1a8b7bc235d5d0b34ef7ab3fcbaf9cefc9cd51057
SHA256f8a56ad52cc05be1b42911e2d0715c78897ad2ebbc433f4b7ec6f6d45e5ee64e
SHA5122da689254deef0929fb2b6d81b44c2dd0a170e24c52495f8925a6113da35b409c1f5f4cc3c6471510a95f8d4fcd9b5c174dc20046704b3a697eb3eaa6c339452
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\datareporting\glean\pending_pings\ae388ab9-6fa5-444e-b1a8-0127818b38cd
Filesize26KB
MD5b9b5c6cd7810ea5c1e84a25bf326dd0e
SHA18d58ee7875448771933e8287c39dbfa8625f2643
SHA2562907c9e1acc9238b6ea94cee785a5527fd6ec1840234d10f02c8a110c17e0c45
SHA512ae64bd3693bf2a477c978db6e1793f74349b35367037c4a3a35f1992c6c12e71c33473846fcc39739b1b9d1423ee5efa527679f5c3ec3e606937ddf39ec801fd
-
Filesize
10KB
MD55306757eeb3a5b47c7e3ddfd5e99dc5c
SHA1f45a456c29692db14c8de69027dd1a93ede6c025
SHA2560f2f636874354b4084e7e5bfc555c83004b573ecfe7efc8e0fef11c6f4d7d49f
SHA5127bb8daadf8678f7bed31eb979de8a5d7d4a2597ce56853f4123f48d54fa18cd5211ee7ab0155393898400e27ab4351f0d0662c3dc28e8c6da1db3241a6d5d0b0
-
Filesize
11KB
MD59474a3d24f7c8ae231e26324517e674f
SHA1381b14fc0acbfd248282417ae489a34cd7c8dc2d
SHA256397353d2bc6859adb60362dea65f4130adb4bb4f95f6428e7180a37fd1433568
SHA512965e6de5fb43b280c4c8177c165e4183e628c97b96505e5cfb942076c9314dfbd7a9845003fe1303f09cda81be8266371ee4cee4f9beaacfc063c3e8372e128c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\odgo8eah.default-release\sessionCheckpoints.json.tmp
Filesize288B
MD5948a7403e323297c6bb8a5c791b42866
SHA188a555717e8a4a33eccfb7d47a2a4aa31038f9c0
SHA2562fca1f29b73dd5b4159fa1eb16e69276482f5224ba7d2219a547039129a51f0e
SHA51217e2f65c33f47c8bb4beca31db2aff3d4bbb6c2d36924057f9f847e207bdcb85ffcbb32c80dd06862ffc9b7f0bd3f5e2e65b48bb1bc3363732751101d5596b1a