Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
17/11/2024, 15:10
Behavioral task
behavioral1
Sample
WizClient.exe
Resource
win10ltsc2021-20241023-en
General
-
Target
WizClient.exe
-
Size
77KB
-
MD5
a307d64f791cb555d029c214364162d8
-
SHA1
04f134fd1a0b71e0b4b745a97e9a08ed1ee45c74
-
SHA256
c346655d32844eda0a9ec3d3d9b16c1c27248bda424fc8b91804d26cd8986454
-
SHA512
d432bcf7874ea3f74ec7e4fc51b400f7c3492b06479fd12949b7cde698e513bbabd08afae8d0ffc2efbe3d7d0cb44e08c5b2bba3f116b9fd6120713e2cd5f96e
-
SSDEEP
1536:x5sFO8g/9VM5dQ+aomobhr3KXg6wzOB1SmOnU7Ua+G:x5sU9Vv4bbhr6SOB1S5nU7MG
Malware Config
Extracted
xworm
left-noon.gl.at.ply.gg:60705
-
Install_directory
%AppData%
-
install_file
US11B.exe
Signatures
-
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral1/memory/3784-1-0x0000000000EB0000-0x0000000000ECA000-memory.dmp family_xworm behavioral1/files/0x002800000004507c-65.dat family_xworm -
Xworm family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1148 powershell.exe 5108 powershell.exe 376 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\Control Panel\International\Geo\Nation WizClient.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnk WizClient.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\WizClient.lnk WizClient.exe -
Executes dropped EXE 3 IoCs
pid Process 3148 WizClient.exe 4352 WizClient.exe 2316 WizClient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1669812756-2240353048-2660728061-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WizClient = "C:\\Users\\Admin\\AppData\\Roaming\\WizClient.exe" WizClient.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 16 ip-api.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Checks processor information in registry 2 TTPs 15 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 908 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2248 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1148 powershell.exe 1148 powershell.exe 5108 powershell.exe 2520 taskmgr.exe 2520 taskmgr.exe 5108 powershell.exe 2520 taskmgr.exe 376 powershell.exe 376 powershell.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 3784 WizClient.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3784 WizClient.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeIncreaseQuotaPrivilege 1148 powershell.exe Token: SeSecurityPrivilege 1148 powershell.exe Token: SeTakeOwnershipPrivilege 1148 powershell.exe Token: SeLoadDriverPrivilege 1148 powershell.exe Token: SeSystemProfilePrivilege 1148 powershell.exe Token: SeSystemtimePrivilege 1148 powershell.exe Token: SeProfSingleProcessPrivilege 1148 powershell.exe Token: SeIncBasePriorityPrivilege 1148 powershell.exe Token: SeCreatePagefilePrivilege 1148 powershell.exe Token: SeBackupPrivilege 1148 powershell.exe Token: SeRestorePrivilege 1148 powershell.exe Token: SeShutdownPrivilege 1148 powershell.exe Token: SeDebugPrivilege 1148 powershell.exe Token: SeSystemEnvironmentPrivilege 1148 powershell.exe Token: SeRemoteShutdownPrivilege 1148 powershell.exe Token: SeUndockPrivilege 1148 powershell.exe Token: SeManageVolumePrivilege 1148 powershell.exe Token: 33 1148 powershell.exe Token: 34 1148 powershell.exe Token: 35 1148 powershell.exe Token: 36 1148 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeDebugPrivilege 2520 taskmgr.exe Token: SeSystemProfilePrivilege 2520 taskmgr.exe Token: SeCreateGlobalPrivilege 2520 taskmgr.exe Token: SeIncreaseQuotaPrivilege 5108 powershell.exe Token: SeSecurityPrivilege 5108 powershell.exe Token: SeTakeOwnershipPrivilege 5108 powershell.exe Token: SeLoadDriverPrivilege 5108 powershell.exe Token: SeSystemProfilePrivilege 5108 powershell.exe Token: SeSystemtimePrivilege 5108 powershell.exe Token: SeProfSingleProcessPrivilege 5108 powershell.exe Token: SeIncBasePriorityPrivilege 5108 powershell.exe Token: SeCreatePagefilePrivilege 5108 powershell.exe Token: SeBackupPrivilege 5108 powershell.exe Token: SeRestorePrivilege 5108 powershell.exe Token: SeShutdownPrivilege 5108 powershell.exe Token: SeDebugPrivilege 5108 powershell.exe Token: SeSystemEnvironmentPrivilege 5108 powershell.exe Token: SeRemoteShutdownPrivilege 5108 powershell.exe Token: SeUndockPrivilege 5108 powershell.exe Token: SeManageVolumePrivilege 5108 powershell.exe Token: 33 5108 powershell.exe Token: 34 5108 powershell.exe Token: 35 5108 powershell.exe Token: 36 5108 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeIncreaseQuotaPrivilege 376 powershell.exe Token: SeSecurityPrivilege 376 powershell.exe Token: SeTakeOwnershipPrivilege 376 powershell.exe Token: SeLoadDriverPrivilege 376 powershell.exe Token: SeSystemProfilePrivilege 376 powershell.exe Token: SeSystemtimePrivilege 376 powershell.exe Token: SeProfSingleProcessPrivilege 376 powershell.exe Token: SeIncBasePriorityPrivilege 376 powershell.exe Token: SeCreatePagefilePrivilege 376 powershell.exe Token: SeBackupPrivilege 376 powershell.exe Token: SeRestorePrivilege 376 powershell.exe Token: SeShutdownPrivilege 376 powershell.exe Token: SeDebugPrivilege 376 powershell.exe Token: SeSystemEnvironmentPrivilege 376 powershell.exe Token: SeRemoteShutdownPrivilege 376 powershell.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
pid Process 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe -
Suspicious use of SendNotifyMessage 57 IoCs
pid Process 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 2520 taskmgr.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe 224 firefox.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 3784 WizClient.exe 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 2248 EXCEL.EXE 224 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3784 wrote to memory of 1148 3784 WizClient.exe 86 PID 3784 wrote to memory of 1148 3784 WizClient.exe 86 PID 3784 wrote to memory of 5108 3784 WizClient.exe 91 PID 3784 wrote to memory of 5108 3784 WizClient.exe 91 PID 3784 wrote to memory of 376 3784 WizClient.exe 94 PID 3784 wrote to memory of 376 3784 WizClient.exe 94 PID 3784 wrote to memory of 908 3784 WizClient.exe 98 PID 3784 wrote to memory of 908 3784 WizClient.exe 98 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 5064 wrote to memory of 224 5064 firefox.exe 110 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 PID 224 wrote to memory of 760 224 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\WizClient.exe"C:\Users\Admin\AppData\Local\Temp\WizClient.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\WizClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'WizClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\WizClient.exe'2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:376
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "WizClient" /tr "C:\Users\Admin\AppData\Roaming\WizClient.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:908
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2520
-
C:\Users\Admin\AppData\Roaming\WizClient.exe"C:\Users\Admin\AppData\Roaming\WizClient.exe"1⤵
- Executes dropped EXE
PID:3148
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\FindConvertFrom.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2248
-
C:\Users\Admin\AppData\Roaming\WizClient.exe"C:\Users\Admin\AppData\Roaming\WizClient.exe"1⤵
- Executes dropped EXE
PID:4352
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23681 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {da376f15-bc44-45c5-bf15-eb7387e65011} 224 "\\.\pipe\gecko-crash-server-pipe.224" gpu3⤵PID:760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2396 -parentBuildID 20240401114208 -prefsHandle 2388 -prefMapHandle 2384 -prefsLen 23717 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6820f48-b20c-42b7-a50f-a1d92eda823e} 224 "\\.\pipe\gecko-crash-server-pipe.224" socket3⤵
- Checks processor information in registry
PID:1996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2828 -childID 1 -isForBrowser -prefsHandle 2992 -prefMapHandle 3052 -prefsLen 23858 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ceaef2e3-c916-4028-a0c0-f7fac0b4480d} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab3⤵PID:1224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4252 -childID 2 -isForBrowser -prefsHandle 4244 -prefMapHandle 4240 -prefsLen 29091 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1972f55d-ba99-4e72-a3b2-2b77f629cf55} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab3⤵PID:2088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4928 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4508 -prefMapHandle 4224 -prefsLen 29198 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {11bcfbf8-a034-4d48-9734-77ae53f3e868} 224 "\\.\pipe\gecko-crash-server-pipe.224" utility3⤵
- Checks processor information in registry
PID:4544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5440 -childID 3 -isForBrowser -prefsHandle 5404 -prefMapHandle 5392 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {223eeb0b-b252-443b-8b6d-dc218ed80c58} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab3⤵PID:5524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5568 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5580 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a968c0ec-7a8e-4839-b56a-8afc15c6c7c7} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab3⤵PID:5536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5772 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d6c0c81-f33a-47e9-8b5e-429c1d815297} 224 "\\.\pipe\gecko-crash-server-pipe.224" tab3⤵PID:5548
-
-
-
C:\Users\Admin\AppData\Roaming\WizClient.exe"C:\Users\Admin\AppData\Roaming\WizClient.exe"1⤵
- Executes dropped EXE
PID:2316
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
654B
MD511c6e74f0561678d2cf7fc075a6cc00c
SHA1535ee79ba978554abcb98c566235805e7ea18490
SHA256d39a78fabca39532fcb85ce908781a75132e1bd01cc50a3b290dd87127837d63
SHA51232c63d67bf512b42e7f57f71287b354200126cb417ef9d869c72e0b9388a7c2f5e3b61f303f1353baa1bf482d0f17e06e23c9f50b2f1babd4d958b6da19c40b0
-
Filesize
3KB
MD53eb3833f769dd890afc295b977eab4b4
SHA1e857649b037939602c72ad003e5d3698695f436f
SHA256c485a6e2fd17c342fca60060f47d6a5655a65a412e35e001bb5bf88d96e6e485
SHA512c24bbc8f278478d43756807b8c584d4e3fb2289db468bc92986a489f74a8da386a667a758360a397e77e018e363be8912ac260072fa3e31117ad0599ac749e72
-
Filesize
1KB
MD5f0731f5760fdaec554ebeac92c5b858a
SHA14ac0a7f4cac1a8993d8d2e41490519b203272aec
SHA256994163ee07fb3c0657229e7adbe8e3468d8f134c607552668a48660f70067e2e
SHA5127fdbf4c8b22f2a36b32212dc41c5379496c8a4a670a6b13eeac02ebfbc394035ff25a8d79ae0a16c4f5f22bd5f59a141bb5774ba5439d1894e5363b3214dde33
-
Filesize
1KB
MD50351b6d5385995efd8f0f96e10779d90
SHA11503b8b19f80adf6ff439b97825adc798b5025d5
SHA256cfa345952ebffdddb214c2f7da3b33515841602a93173f9635c9513a6cad685d
SHA51280be5424fc5e3eec6ff41475b05d03b75c80de5f6477c9084f9da374b7197056a84432c17e8cb77e9d3c08fbd01f9fca9c6b4859e2f984d4de70ce704b855cae
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\afyb4qvh.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5e7e5e5d0d2d58cccaab7bcba70fdc9a7
SHA1a74c62a0b28d3da61377d80cc1572bae3dbefc9e
SHA256ac5bb04f2a97cc92900a6844aeb892b860d5a9ad33e76c1d5f0fd46c0fc1897d
SHA5128b09fb23836e63381bb53183bd10472201d67458c9aa85c7e1bd5e10865096add421e05181508ac5548c2e26b831aec146f47ca4b57e6fefa123a28bcc55f06e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
308B
MD5d6a65dccbeccd494ab22a4edeb3aeaec
SHA16d7cf735eb92f66b445004e4277402e64f99017a
SHA25673c57e5496ac04494551578e98b8973093d6af79ed94ec3069ecb7fe0dd32636
SHA5124d2473daddcdd4302bc35a79c4b06b7b01b30c2a94255a439941ad5d14339bfe501b7cf0e34c9852c5eb18ffd46c703fc78dcffc5847feded302547b16e17b50
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ad3f900454bf0da1b626af0812e76169
SHA1add21c2db2dcf2a24ef846159d0bafdd58c21722
SHA256c720dcae77e45ac9ecea0fe597d85ce76451a3d9824746d39ea9155a2c171bb7
SHA5122e8bbb03efce8073ea0882fa637586b1a535e681cfa0d7da222783b56dff596e509af9748ef88f002e1c1b9f8c23b23cede563567ae65dad7f2c0ac3950bc166
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD524e3d3adaeccaf07ff059d5a0fde6fd4
SHA1200d040ec133b4fe11915545dfddc35a0f5ee2b2
SHA256a44adf1e1aed44c05890f3088e92e083a2968b2bd0bfacaee5181dde1a996742
SHA512fbd5fe94edc5187dc9ef07ae511240fcb53503656a2fcde02fe917b6c5e9babc4a8b7ba4af1819c8e603421cf24034735e2a5fa92b1343c4a15a6d82701b85ee
-
Filesize
783B
MD5bbe260f0bfd17402da48a469e022213e
SHA10af6b017102b45b41e5481561864824af2e7c7fa
SHA2560b3606d7c6f965e871acbd79367eb717ce1bd0574bc61f0874ac66ca6c834921
SHA51241473f821c457dcc922a3abe6b84255db68035372437a7a01a4939303b2cb89fff67a37dd56931b1e22512532b7aadfd07b31843f33684768d19fcb97a7db603
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\afyb4qvh.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56a4dd5a2308018bdb71792ef28ce83ea
SHA1dd8e360bec1681cbae76f92ffad898edc905ff10
SHA25633733a239538ab408235a31f7e6f99ec2c93f09d0ec24622b31ae3175bfc35ff
SHA512b0139bb500ec574ca2dd62d55c744a80ce6132ca8f5f86dd863025a23b52aeee6452321275243b0615129b0a98345b7212cc56ff3e7d2840faf1048c4b2a73dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\afyb4qvh.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5d4d1222bfaa4bfec97c5f1c5feac2ebe
SHA1d1c150d345c3e19a6eed27810dd36bf7156af4bc
SHA2566f702354ed54cecee99dbef9b1f35e6436855b5120e2ba1a263121b7d17d616a
SHA512d83a6cb3ac096258430cf6d7b6dd370189b244fa43f37ae61ec6806f9db51b100f246f995a602d8310b9351a07162d8c0655d2bca90776aec9b96f8c74d8523a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\afyb4qvh.default-release\datareporting\glean\pending_pings\160c7043-d995-445c-82f5-874aedfd41ec
Filesize27KB
MD57c819ef9d8fdf8901014e89c7ced5f6e
SHA1055021f6ac0229ef021be83166959cae7ea300ee
SHA2562bc35dc55778e8ab3bcab29c70143dd3e6fb1c264d48be7b47398eeb32ddac0a
SHA512296dbf04c37e3cfb79e2c8668961e3cb9aeb011a8bdc216464436bad358ede6255d531bf8c6b6d73428eec403555f315cb37f7a794946f15173b6fbd49ba103d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\afyb4qvh.default-release\datareporting\glean\pending_pings\5442c738-fc19-4a2d-ad9d-0f646f197460
Filesize671B
MD590d9aa9098f850309668d8a9108578c7
SHA1eb54853ba3ea5e43fbc4011e7031da446b7bbf8f
SHA256e36b8a845dbc7f37ec6c2887f425c7e97ce7457f6b88bee917cb776e980c457a
SHA5126d9c83f169fdfe1b0047f4eafb7b3e08fc3eec8aee9d61402ce9988584e671050b90011fe6fc2527ba7c531afb4bfb715b17b3c7e175ce3e9003498d694007c8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\afyb4qvh.default-release\datareporting\glean\pending_pings\6d04088b-83b8-4e39-b374-3bed12cc6797
Filesize982B
MD537697f80b5d8926f4a7c933d2090e1e3
SHA1ea7d91808c92b3cef07470771605e644328dee65
SHA256c69045a379e18cb76d7e3fb5128ecfc5318a39031b7b5752e39a4f8837e2e3ff
SHA51286cb85bc236d2efb8ef56b76529842977883067c62fc69cbfb7b7fd6c2abbd830a94c4f9a0d0ee6e4cdc5a3ec7585be61929d89057aa18472136a565da9341b5
-
Filesize
11KB
MD5ca640cb8aae76bdf0c612697fc227425
SHA1b6c218c0cc2bc242461d4de3873d5ea346feecc2
SHA2563923807fab048e82b690c6d02b05b24689516534a159a83204883a9ba45bfdb6
SHA512e976d4e81be0e1cb3e66721aa4544ac91ee67e0aa7620485467386b4c61da741b6365f471507b89301c4a6ac122c6afd75bbcd3c0873ae3e9c47b4f10a7c0b4c
-
Filesize
10KB
MD57f065c7654c3f412de53f094ba0b1aa9
SHA116a6ca9ef35f288d28cfc68210a9bf72299036d4
SHA256a25e25ef6698c756195abbc40afb4c94af9f4561c842ec687d2747b56a3be0b1
SHA512dab1a508b9925cdb86ff752661956b3b9f53710ba0b508c17a57f2c312bd8ddcf004911235c30191f7718c85921133b3904e04c0a857e727b1f0fc8b7278214d
-
Filesize
77KB
MD5a307d64f791cb555d029c214364162d8
SHA104f134fd1a0b71e0b4b745a97e9a08ed1ee45c74
SHA256c346655d32844eda0a9ec3d3d9b16c1c27248bda424fc8b91804d26cd8986454
SHA512d432bcf7874ea3f74ec7e4fc51b400f7c3492b06479fd12949b7cde698e513bbabd08afae8d0ffc2efbe3d7d0cb44e08c5b2bba3f116b9fd6120713e2cd5f96e