Analysis
-
max time kernel
14s -
max time network
61s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe
Resource
win7-20240708-en
General
-
Target
ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe
-
Size
1.8MB
-
MD5
415baeb4aabc82efed84d80b0be30424
-
SHA1
304f55114ea08d1785b17c924b00fb0ca7637d3d
-
SHA256
ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b
-
SHA512
ed1faf76f9fb9ccf38e73a5bcb9876e877ba9658e81b6eb76b431d7d136bccf58053dbca7af75f703bd3bff56250fb0970e07ca43e9a0b9534bf61d55c112742
-
SSDEEP
49152:si/JlC7+Q8H3SNPX9tvMu/3QcC4Ilsaga7asxy:siG7+Q8iVttvM04t7aj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 4 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3FEtgVY.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ EbjU3lW.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 3 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2124 chrome.exe 3028 chrome.exe 2492 chrome.exe -
Checks BIOS information in registry 2 TTPs 8 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3FEtgVY.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion EbjU3lW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion EbjU3lW.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3FEtgVY.exe -
Executes dropped EXE 3 IoCs
pid Process 2140 skotes.exe 1136 3FEtgVY.exe 1360 EbjU3lW.exe -
Identifies Wine through registry keys 2 TTPs 4 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine EbjU3lW.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 3FEtgVY.exe -
Loads dropped DLL 6 IoCs
pid Process 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 2140 skotes.exe 2140 skotes.exe 2140 skotes.exe 2140 skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000012248-331.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 2140 skotes.exe 1136 3FEtgVY.exe 1360 EbjU3lW.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3FEtgVY.exe -
Kills process with taskkill 5 IoCs
pid Process 2648 taskkill.exe 2480 taskkill.exe 2952 taskkill.exe 2900 taskkill.exe 2444 taskkill.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 3FEtgVY.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 3FEtgVY.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 3FEtgVY.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 2140 skotes.exe 1136 3FEtgVY.exe 1360 EbjU3lW.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1244 wrote to memory of 2140 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 30 PID 1244 wrote to memory of 2140 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 30 PID 1244 wrote to memory of 2140 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 30 PID 1244 wrote to memory of 2140 1244 ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe 30 PID 2140 wrote to memory of 1136 2140 skotes.exe 33 PID 2140 wrote to memory of 1136 2140 skotes.exe 33 PID 2140 wrote to memory of 1136 2140 skotes.exe 33 PID 2140 wrote to memory of 1136 2140 skotes.exe 33 PID 2140 wrote to memory of 1360 2140 skotes.exe 35 PID 2140 wrote to memory of 1360 2140 skotes.exe 35 PID 2140 wrote to memory of 1360 2140 skotes.exe 35 PID 2140 wrote to memory of 1360 2140 skotes.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe"C:\Users\Admin\AppData\Local\Temp\ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\1010606001\3FEtgVY.exe"C:\Users\Admin\AppData\Local\Temp\1010606001\3FEtgVY.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
PID:2124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6ca9758,0x7fef6ca9768,0x7fef6ca97785⤵PID:2092
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:1856
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1076 --field-trial-handle=1292,i,3597624312474013827,10946122135193123663,131072 /prefetch:25⤵PID:956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 --field-trial-handle=1292,i,3597624312474013827,10946122135193123663,131072 /prefetch:85⤵PID:1608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1292,i,3597624312474013827,10946122135193123663,131072 /prefetch:85⤵PID:1828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2240 --field-trial-handle=1292,i,3597624312474013827,10946122135193123663,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:3028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2248 --field-trial-handle=1292,i,3597624312474013827,10946122135193123663,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010607001\EbjU3lW.exe"C:\Users\Admin\AppData\Local\Temp\1010607001\EbjU3lW.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1360
-
-
C:\Users\Admin\AppData\Local\Temp\1010609001\c8f634477a.exe"C:\Users\Admin\AppData\Local\Temp\1010609001\c8f634477a.exe"3⤵PID:2268
-
-
C:\Users\Admin\AppData\Local\Temp\1010610001\45527dd12b.exe"C:\Users\Admin\AppData\Local\Temp\1010610001\45527dd12b.exe"3⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\1010611001\bdf13d3c7d.exe"C:\Users\Admin\AppData\Local\Temp\1010611001\bdf13d3c7d.exe"3⤵PID:796
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- Kills process with taskkill
PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:2480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
PID:2900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:2444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2700
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵PID:2028
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.0.721883260\1071930010" -parentBuildID 20221007134813 -prefsHandle 1212 -prefMapHandle 1092 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8ebbaec3-d804-4b62-9f55-48ed105b3935} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 1320 fd09958 gpu6⤵PID:1444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.1.1306399753\393754133" -parentBuildID 20221007134813 -prefsHandle 1528 -prefMapHandle 1512 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3990b5cc-1726-43a5-8976-fa4a1d89b387} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 1540 f7eb558 socket6⤵PID:2800
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.2.159333930\1770438217" -childID 1 -isForBrowser -prefsHandle 2016 -prefMapHandle 2012 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d8683e4-b096-4ff5-b0b5-3163a7622648} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 2028 1a497458 tab6⤵PID:1772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.3.368331725\807423836" -childID 2 -isForBrowser -prefsHandle 2756 -prefMapHandle 2752 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {89aedf78-703f-40d0-b0f6-34fc987a4579} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 2768 e63f58 tab6⤵PID:768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.4.1691584344\311942617" -childID 3 -isForBrowser -prefsHandle 3708 -prefMapHandle 3696 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d5f68950-42d6-4efa-9b0c-9d46a18eb01d} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 3664 e6ea58 tab6⤵PID:3424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.5.679176008\367181461" -childID 4 -isForBrowser -prefsHandle 3808 -prefMapHandle 3812 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9715d17c-dbd8-4be6-808b-916ce25d7743} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 3796 200c3858 tab6⤵PID:3432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2028.6.816546792\1023982007" -childID 5 -isForBrowser -prefsHandle 3972 -prefMapHandle 3976 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 564 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {30251a79-759f-4c3b-9e59-3c954bc84f2a} 2028 "\\.\pipe\gecko-crash-server-pipe.2028" 3960 200c6e58 tab6⤵PID:3440
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010612001\d3c2cc20a2.exe"C:\Users\Admin\AppData\Local\Temp\1010612001\d3c2cc20a2.exe"3⤵PID:660
-
-
C:\Users\Admin\AppData\Local\Temp\1010613001\cd37f863d1.exe"C:\Users\Admin\AppData\Local\Temp\1010613001\cd37f863d1.exe"3⤵PID:4060
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2988
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Modify Authentication Process
1Modify Registry
1Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5fb6135bdbdda6a5217fa3911b015d
SHA11072464edd1283f5bac80df541dbafb3817c7ef5
SHA256ba76a6bbac67f4d0761edcc5a5ad6e8f9b5e8f8fe1f76988040a849a11211376
SHA512453a841ad480bf1dbd407bb6a975a05c5c8d1e012b4288d1d327b4289292ec1f7be21670450b6c04f2308416092c6e7021e1a91444dd284e88b8ae3f927cc14a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD576583a0586bc24f682b6a032360f5836
SHA1d521dc52357c2d127f93388a3514366bc3175ec8
SHA2564d91e56f623d43a25756adb07bc9f2d2cf7252bd4f5beb0c27508c245bd7b396
SHA51297b0e6f30468173bd8784cf949b747a0992e88344b34a5714aa04601f9a9027d66080e2c81358bb39ce03f60a6bd3ff1a5d59451668bde6570c864af146c69bd
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD5b60b0e8338f999973df533385ceb992e
SHA16984bec71d6fe0c3a1535379621cfe7a752e066d
SHA256fc30f903c368267084b5c9d032eb32e30b04768c89be643033445969d0d1b4a0
SHA5120ae353d363b53cf90d2094d9a1e8090ed9a2d14dd857130cc66bbcb458137ff5409c1f002860032a1f320afe5c62b6fe0650212cd79ba80ce770e377f9452c83
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD5a151487b27e539f2f2ec79ac50940872
SHA1eb655ee0a8762714754c713e5bb3171ff1be3467
SHA25670a4257b71a11086ab596f6122ee6a8b6ef9335f5538f79e68f48727fa1dc439
SHA5124eb5de737ad27d4aed33d02ef3b6f58c045252e81b3b733de2d204747519d8f6ff9ea75c2858259467439eb833055bebb8c3449ce8fe68852d3ec51bc7b58c86
-
Filesize
1.8MB
MD5f39d36f64217e34500b5bae41f7db3ef
SHA106c5d3929fe215180455f771eccaf67e107a2f59
SHA25601be31d9e89c730cc3204343cb7ccf8a765d0042a2de86d97b1489dccf1e3cd8
SHA512092f0cc00bb2698df8ca4034f963d10a12f2f158480afca39c77f0d5a1f950cdb9fb46713da5d51a349232e05062df9cb69c8341766c4b28bd01063ed9da877e
-
Filesize
1.7MB
MD52843528f4a04c4d3532c3b54af2f5537
SHA12e9a764fdae46b271af76e7e55a85ba2dc580701
SHA2567d36844cd7e12fd72f6f94f6d6cb5fd3b37fdd956f7f9a9bc09d96404b834a46
SHA512d7d24803be7fe970652e6c37b2e512c6e7fa27b7abd892caaf67fbbc863703cf3748389f02a39958696a2fc866652921a98efca01de1ca468ebcc02ec1c6bfa2
-
Filesize
901KB
MD5b41ec8796f23c8adbc8c485921e30c05
SHA1317a826843e8d682d29390645cbf98b4cc2e61d9
SHA256fcfa6a31d016d9b4e92fe59ffc959cd406d88543643f375d18e549e52f249197
SHA512709d4964561b8ecc30eb692369bb03478242d6b5b77e376d15da0ea9e2258306611f6c9428b3190cc714464f1f089a24fcbfd7e6472d3b27fc4f79c0f101be4f
-
Filesize
2.7MB
MD5d411ff4997d06a1d8946b0bb6c1c4392
SHA1851900aeb53cd9ecf0e6ed07589e3da3f82ea722
SHA2568b61b8ac54efabf8708464399025293f88934ed3b8cb68d8c1bafb3e17fc20a8
SHA512bf5a7bd9b53a4e43ac6b810370d276a63e528faccf4be373349b4f7f7753923e5a1c514aedf71d0e47f777fce952065e66f2d3ce3f5bb51e4177aee201c7e289
-
Filesize
4.3MB
MD5b9135cce5a371bfe6dadad02845410bd
SHA196fedda72617bb217f710f8470e97146d7fbc70c
SHA2566099d2337b585d79dd82ff5771a4b86840668a1213d01862cabccf09f40b3e6e
SHA512337c7d41a81eae7649d4bf115be33ec7b4f3f630702e3ffe522929e39c2609656bcb5f6ae2d4bfa53b74779a0a178d786694ee893bffbb794c6f32b3f22cd5f6
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD5415baeb4aabc82efed84d80b0be30424
SHA1304f55114ea08d1785b17c924b00fb0ca7637d3d
SHA256ebae517727f7f90f091d64011869321f4d868d2e94f71cf097d96fe8c721528b
SHA512ed1faf76f9fb9ccf38e73a5bcb9876e877ba9658e81b6eb76b431d7d136bccf58053dbca7af75f703bd3bff56250fb0970e07ca43e9a0b9534bf61d55c112742
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD59d8ff5537a2bd5bce0284824fcf2d15c
SHA11fb95091ff47b7dc83ab05b41cf2cc9ceb22970f
SHA25654ecd3bb993c98e4856251ada0f31cdb1029a3300ec1fd072d7d2bc3da5a4929
SHA512ae6600b35120a14067f7f3452db98390f398919fe9e291a99dbc5e36e734b6c4b04eb322ce1f2c1c68f34f81ed3dc45440a97e0fc3e656f0d1776732eeb38bca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\23b52f14-e31e-4eb3-97fc-5cc26a292143
Filesize745B
MD53c4a8a71d096519c39e3373b690c2612
SHA137b822f76b245542bf0058959fd24c24f42e54e5
SHA256082b6399c797dc6dcde48bdba8bcd822218120293045a859ad798d1a2145afe8
SHA512daa92b7942c69184d779a03a6ed74082837afd20237f8b8ae03bf94b91469ca6319cac1ccb34643acd07b6c755b318a9d2ec74911d159a49805fcd7f6d80d141
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\f200d6df-276f-48ed-ab9e-33afe32ad8e7
Filesize12KB
MD51db9394b0f1561a7492ab9557ff37460
SHA11321fc9fc824648c5392530aa2d3df89ad6c9a1c
SHA256a7554c6b6437a282d6202be7b2f903e6e8877bb02c4cf9634954a9bd45bc8f53
SHA512a2b7075a47a264b19c42dc109ea5964b2b002bfdbfc625f623b457e37949ed9b871f25ade94520166e2e6ba67a0500c2d077087a5ec78a7dec65eb5fbd4993ef
-
Filesize
6KB
MD50706164076f18e6612354e10c93ad215
SHA151d6854d23d52b2eca55697175de8186221591e0
SHA25600bd26cde1d7b02c3027ff2acb443eeca612021ffbecc1e3eb5bad2ba7711153
SHA512e20332f5be1c9ac5241a2568d1a89d1773b997cdd94fb633f27b0acbfd7b621e54a00198433e792e60c6e076827aa8a3d11004194f553136a5f86163b64dc912
-
Filesize
6KB
MD5a0869ee01f4828249db0204ba37aab96
SHA1a457d872ddec0b18179e7ddbf022477aa6ebc43e
SHA256e11ee2f8f3888b6fcd220baf92613c8d4e68ec7465fa748548826155a9444b2b
SHA5121495af7f7549e3013559d9bd219887320cf216f49c850e8e3b2d55db394f3bd30ca45c8c9d1c0e0cf0e0e33488758766f583023748b4f3f627995ae90b1c4f9d
-
Filesize
6KB
MD5000225e9e84b51413de6104268f72889
SHA166e4b2b2226adc77d9534fcaaf0f8c8e267ea6b4
SHA25622ba72b8c091feff5c5e6a59b04a3cdd884032d3f4665b8e78c3dba97c48d73b
SHA5128ccf22c7d925efbdac00e82bdc049cb8d26cf1b72c46345deabdd45676a354dbc487e56d7907ed2df22c8841fac5b6d86cf174515ce701aa5b21bfe2ce7292e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD53dc733f51b6c47c0e57ae7035b9abacf
SHA1d4c28a6f9d4bae9e297440a46726a2cb3e2504ba
SHA256aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1
SHA512e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067