Analysis
-
max time kernel
899s -
max time network
902s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241211-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241211-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
10-01-2025 17:26
Static task
static1
General
-
Target
JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe
-
Size
992KB
-
MD5
e8c47dd833dd0fb7c60becb77181763d
-
SHA1
c1267f03431f62775f2dddee3cc0b4f138aabe02
-
SHA256
b250dccc534f8bacc38656f7dba9bbf3b97c572839f28c49bb8f24400cd52170
-
SHA512
31a34b13af3a8d02b7a1141b0f9bb50bb6a20b14b73bc6d9d7f19818cf8de8d7257e5048306cd2a4869f7c6074fa516d8e5aa02dc348731e7f1bf1e95f409f9b
-
SSDEEP
24576:rFhNhAgGFk+hD4QQcf7tg39/UBzb2HiRKcmtUlyGE:hhAFk+VRtS/gbTZf
Malware Config
Signatures
-
Nanocore family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
Identifies Wine through registry keys 2 TTPs 1 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4084745894-3294430273-2212167662-1000\Software\Wine JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Service = "C:\\Program Files (x86)\\SMTP Service\\smtpsv.exe" JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 5 IoCs
flow ioc 80 discord.com 81 discord.com 82 discord.com 83 discord.com 151 discord.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\SMTP Service\smtpsv.exe JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4084745894-3294430273-2212167662-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2576 schtasks.exe 2276 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe Token: SeDebugPrivilege 4916 firefox.exe -
Suspicious use of FindShellTrayWindow 21 IoCs
pid Process 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe -
Suspicious use of SendNotifyMessage 20 IoCs
pid Process 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe 4916 firefox.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4916 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4576 wrote to memory of 2576 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 82 PID 4576 wrote to memory of 2576 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 82 PID 4576 wrote to memory of 2576 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 82 PID 4576 wrote to memory of 2276 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 84 PID 4576 wrote to memory of 2276 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 84 PID 4576 wrote to memory of 2276 4576 JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe 84 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 2480 wrote to memory of 4916 2480 firefox.exe 96 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3312 4916 firefox.exe 97 PID 4916 wrote to memory of 3124 4916 firefox.exe 98 PID 4916 wrote to memory of 3124 4916 firefox.exe 98 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8c47dd833dd0fb7c60becb77181763d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7261.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2576
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SMTP Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp72C0.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe"2⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1916 -parentBuildID 20240401114208 -prefsHandle 1828 -prefMapHandle 1820 -prefsLen 23839 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b6f3cda-7218-41a8-823a-68c2d1320b64} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" gpu3⤵PID:3312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2380 -parentBuildID 20240401114208 -prefsHandle 2208 -prefMapHandle 2328 -prefsLen 23717 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9446635b-eac6-4091-8b36-e4013244ad65} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" socket3⤵PID:3124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2756 -childID 1 -isForBrowser -prefsHandle 2900 -prefMapHandle 3008 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50e77f4e-89f2-48a3-979c-a29c65c26c57} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:2432
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3844 -childID 2 -isForBrowser -prefsHandle 3992 -prefMapHandle 3988 -prefsLen 29091 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c87f9662-955c-4fc7-a66b-5e6c345113bc} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:1224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4700 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4664 -prefMapHandle 2528 -prefsLen 29091 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d867b58-3652-4c28-8fad-a2af34660ccb} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" utility3⤵
- Checks processor information in registry
PID:5456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5384 -prefMapHandle 5380 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a91bbab-dfe1-44d3-af20-a0a51d891806} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:3620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5588 -childID 4 -isForBrowser -prefsHandle 5636 -prefMapHandle 5632 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9cc23ccc-a34e-4cba-92cb-5ee2bcbe4fef} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:1648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 5 -isForBrowser -prefsHandle 5776 -prefMapHandle 5784 -prefsLen 27178 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {95f96791-b859-4463-9f74-4e02092d7fe8} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:5496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1500 -parentBuildID 20240401114208 -prefsHandle 1560 -prefMapHandle 1556 -prefsLen 32448 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bee60478-a80a-4e22-97f1-b01e744729a1} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" rdd3⤵PID:4688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6300 -parentBuildID 20240401114208 -sandboxingKind 1 -prefsHandle 6292 -prefMapHandle 6288 -prefsLen 32448 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5303dd0a-99a2-436b-9bf5-cccf59777073} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" utility3⤵
- Checks processor information in registry
PID:5536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6584 -childID 6 -isForBrowser -prefsHandle 6576 -prefMapHandle 6572 -prefsLen 27257 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6da03572-ef60-424e-bb49-eb7837fc297e} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:5708
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4128 -childID 7 -isForBrowser -prefsHandle 6904 -prefMapHandle 4124 -prefsLen 27307 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {89422c59-b8fa-4f3a-9a77-eceb25e64aea} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:5340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6008 -childID 8 -isForBrowser -prefsHandle 5552 -prefMapHandle 5416 -prefsLen 27307 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ed1f23ab-54fb-4761-95fe-8d78d3347520} 4916 "\\.\pipe\gecko-crash-server-pipe.4916" tab3⤵PID:4544
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\k0aifmy2.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5cc31083f09355c624d7d613ed6a0d57e
SHA172a824d415b5c3b7bced1c23e6f593f6f7e5064e
SHA2568baaf4b5452c4fc75cf749a6cdc16bb1a0a6ec92a6fe80442f27f7576835c5d3
SHA512e1ba2ba354a4fd75a26ff165d0f7571694db3c7418988f4fb60e11e331fc598434620fbd678b90136869164ae34ce4dc269d537f52406274287fb1b004e4bb2a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\k0aifmy2.default-release\cache2\entries\5F81741479D5F3AA4345EE5E90D80C2F2D96D361
Filesize100KB
MD5ff0de1ef342df73eccef409d3c460042
SHA13a510c7d9e1bb55a90e48ee0078a94b774789982
SHA256b2b76036c813d11bcb39d7fec5654e9d692e2601abc30fe1d655cfed9e106c4e
SHA512b560ba8fbbb339e9a06529103b5bea8f748437b306cb0c9927f5e925b3367e78d6ee680fe3b042d9a386d60356b932289a39f7ef399f1f97e168f50a55f4f151
-
Filesize
1KB
MD55940ad95c362bc2e7bcadb1525f83343
SHA1dbe3bac2f040cb5e6829f7204ffca645b4a66df7
SHA25676f996ab6677ac150e269e78d0f757d56dd23282d36e4962abc7507ab93cda8f
SHA512a5221540d61e00c2ca2f536aaea9c9842078926c1777dc1d91a84f3f0c1f08a75b3f4d2d5cb18d4a286fcdeb0efdfd18fdeea1397ef6f0c1fbb3069fc1c34a1a
-
Filesize
1KB
MD51129270510286b9e8bae6dc678757352
SHA1f8f3af28a182023adb3efaaa79d034f399ec16d3
SHA2566fe1bdf3d1dedec102ac61b47fff909c53e0df8903098c52f3843b1e11a2d863
SHA512cec6863e4d3a431668cb2aa2fd6bbd032a3e1cc61698fcd9fe952fcffc6ebda0a87ead9090767365a473c143c8b32fd269a4af03454d0f34858252c4b767844f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UHH8CAY2NAUWPI72KWXY.temp
Filesize15KB
MD542417f2227578ec62dc6e4fb405221bf
SHA14465e6e7a4a0af5afaa40bd76d3f2b2eb1f73ec6
SHA256146cd1ab6251c1e7c076558eb32f5e82408a9b012f311c713e615288df4c08c4
SHA512d5a89190ea5ae7757b46fd825e6d15e4ce4ccf3a22f564366763df7f3c89042a1d8f700432bd0fd0ae0481b8762a67a22dbec948358a26ac9021d62bfccececd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\AlternateServices.bin
Filesize6KB
MD5f290e8ef9559c8885453935789a85246
SHA1b0cf573c1a2790274b505091f96355a7771ca4ec
SHA2561527d9f1aee1a3097ac79d99ef97b24c663b2c041fa699174cc5e761f8069089
SHA5122d286be08ee619e5653cbe94c6ce9b45b0339eed3de3757d1a9769489d9a7539eb9381f6fd2b594a0863d9d7601a43676e0b57079b04c2b16c80e9109423ec09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\AlternateServices.bin
Filesize20KB
MD51e1b2c52dc26281456451e07ab59c442
SHA165bb4a88f11883990c52919a79bebf3d98b7a186
SHA2563bc3738f0a3534472c36460ff94ad8547aba58b5b9eafe43f3c3d2d5bed58cec
SHA512c1f2ec5ae7d5eb0482f212ce498e6ebe6bf9838aee1039c32cc0c4127bf770b5c1b88283a04cce9011fef4b348f5ba143d58dcb92d6bfb2afc2c3922f932c8a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\bookmarkbackups\bookmarks-2025-01-10_11_lyxg1hw4T5jXURaRXgX5wQ==.jsonlz4
Filesize1002B
MD52e7447b0bbbd6748865b8f7ae490107f
SHA1e8078861912e9cb3de68989ec14365e61cc514a0
SHA256e2284d8562675accf56af50a74d81b00e2cd9b6ed932a3401157c33b43b8eb26
SHA5127093a29ebb1bb5b44dceca71f96f6a5d5a4f359facb1a1cd4d8dbcfab4f7ed8773189cf44bf892d50b29fe0796c127c7f35095f556e3e45893dbbdf1809f117b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56cf1b34cef5db1086268d24e44768c1e
SHA150db9f34306ae20870405537511cfa7b5b1e7a9c
SHA2568ebc466d800a9e5f6537b98bcbd31ccbb960e62a0fc8fb7d1a50e8c173467201
SHA512351519f9167108cecb80a873d9efa415788c9152a0791006ba7124ddf4bd16b87d09dc531a871eb1090ba1ccb4afa9f3e838b854327257b6b8a372be701198df
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\datareporting\glean\db\data.safe.tmp
Filesize101KB
MD5a0fbd8fcb336cd39520a5107a95af376
SHA18390d443c4b0b503f3f93cb4b1dfef9c8545ebbc
SHA256f4d28668be4109fe214b5b466b2aad39de02ba9210d396fcc77df82e7b262d8d
SHA51252274361dcb741482ac14e0e06b8dcd6ac253244f3ccd818afc80dc39b6a440fa6f3fc8803398b889ca234807470b40ae3afca3f2375bca4818975d2e6dc04b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e5e64d957674c5fd522dc59d4bdaa993
SHA134df8a4c0be3bada9e8bfeb05aa9bd8ed5af0e91
SHA25618d4b78db2a1814a1155461ce7f69acc68d04c88d492403c16428cf6d3d5e5f8
SHA512e119afeeccce89c7c3dedc8594fad6dd4a6ad6407988d520f0dede61b5b4516486f597c51f7523d353d1cab06da9153e6858172c31bb453dd364394f7832ac38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\datareporting\glean\pending_pings\35b2229e-f869-470c-bcad-110fc21e16d9
Filesize982B
MD5aed8b049e580f10abf8b61ba96133a8d
SHA1bb875554dda91cb5f657b8b1d0cfcacafb17956e
SHA256f5a5cb7dbbf6480561789cca371664f1c733c6cdf9d29bfa71bf6cb7f023e399
SHA5120186d1514695629ba5e3dcf52546870e1666512ba14a712f6d35d78112678f820910f8a51da731b38ae1b7c4f0fe63fc07fec538d54cee0338ad01ebee0e78bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\datareporting\glean\pending_pings\4966e025-a4b2-4cfe-9fae-3525e2dcc54f
Filesize27KB
MD5e5b53e80ecff7092c6817ffe7d722c99
SHA166b3212a25bed15dd13794413d6fe0ffc17b2b74
SHA256900163c7f3966214b8be681ca8f9c02093e3cb34b3ed3913926635fe3118d427
SHA5128bfb856bc35447376a3d2e76acf240724c261f886c5bce5a23320327adcba37c72825ed9a595fa732d0fdaa6d76a167aa83122d3ad9bcb7a3906eec3eb7a1aaa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\datareporting\glean\pending_pings\eac995cb-28b0-48b9-b9cb-931d1da0c7e4
Filesize671B
MD5297ccb3c8f18e20d7824337d796e38c4
SHA14cecba3a12ffbc3234f2959f3f37191a1e1c078e
SHA25615e36aba1dd83a5d09cb1d0c2ff560ffb13669349ddfe329a88d591690de81ba
SHA512aa36319bb2923e98134ca4f53d43b8383023cfd4b4000540c76a606003df28ae879643a71fa8e32354efc621bde6a89462e26566642bd483e386ebf715784038
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD50eb31f78d53a853e9207aea3b155045a
SHA1e173d1c829c5a2b0e7dcf468a02ae5db73dd03ee
SHA256cf2cdaea83157851d3bc7baf575235c329d4c7718c6e4585121c068eb3d81f1f
SHA5129bf1b5c6e0b762ee06bb589f64299d07e2d07a81d41f0b12f7d97f8282d7171a668a67cc995983e65b561bffcaac0cd85aaead3ac4925c4a91659a6242659221
-
Filesize
10KB
MD519a820acb7ff4279e8db435c2eee2271
SHA121652a2edec7228eb7c429e7b3997a902451823a
SHA2569d55ed4b1edbe54e3d1160c43e729e24b1b8700fff4522f8343a76621cc0ff33
SHA51299ebd9c10d7f321876c4ad972a1fe80c4349204888ab7999792d1c4acd67177500ada4cc772c290994f442a71568426a8d2a957d51392eccc5e22d764cbf724e
-
Filesize
9KB
MD541ae3ec085eef16caa6e728a322d77b3
SHA19b2cc297e6c0387b799bf15b83973526ca2a6c31
SHA2564357f74e19e44b568a47380e2d4416ff5f4ea89ce6935c12ed33e652139eef99
SHA5125728680bcc0ecbc8a9bfa1338394709fc00791f039f0dbddaa042dc7e0309f7f48688d28accb8230c6b559eb311c250e6dd12acf7eef8be0d01c4a823e3b6520
-
Filesize
10KB
MD5dceb9b90a74c0c2a98498a43dfab01b0
SHA1cddf12003c95ebe1653183d625d61cda9211f2f5
SHA256720cff43697404fc7945893af664b84f792367dbe069f1bfc1fd73b99109ec60
SHA5127010f3fe03f1195a2377ea74faef775397c3c6118a729ac32db86eb81ee7456b0604d088ac872841babdfbd4b45032b77ce9ee16e5c0f59a80d895bcd2766641
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\sessionstore-backups\recovery.baklz4
Filesize1KB
MD539ebac793ebfedfcf0c169a58d8c67f7
SHA1807ae7af5cb32ef9ff40d838cc231a2600b7d93a
SHA256fcf3de7a072a9c5f830944c2d8911d8296359355aed7bd385c5dddb7ba9a4b82
SHA512b65eb786e75fa463181d95dea00541015e8ce2cea5655dfc8971de41eeb31d0d4f53cdaf7648818931481c41f2bde2c806bef19fd15364d657b654f110976164
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\sessionstore-backups\recovery.baklz4
Filesize26KB
MD5a2a026caa5c024fed426d683807ffd6b
SHA1e7cb42093b6c6725daa8421c52afd616f1a5741b
SHA256715fa6efe0ee1fde360007bc4737ae9b55ccf1917090af7f281cd88769076e62
SHA512447ecc699912a5756235b75a94e9a742a89473ba9d18a1291dafe2d5aaf146cdc0f13b075ddec4fe56e9eaed3d830abae322b449a4147df01d82c72efa94ff90
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\sessionstore-backups\recovery.baklz4
Filesize41KB
MD54f40f4882bbf3dd0f2e4f04216d97c49
SHA182fd991d49fbdfe63bb70ab5514f7924819fd038
SHA256d09186f6b1255c06ab421479032bc5610baead2841f89f3383558f1b2bad489d
SHA512b35d0f933a42067fb8a48a84f5035ec4804e44f569a99cb82b34c5072b70d33ba2d2fcc4bc23f9292d4136e4914d9810fd4a89597f21e97eac7f41f7e5c5ef74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\k0aifmy2.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize616KB
MD50b8ceb72734d85ab057d0971905fc135
SHA1635591328a49575053ef994265a9d6bcf717ed5f
SHA2568c062c5b3282f7207ce0f27336b63a6f3c3df03cb6f4826f9b1c09cd9954f762
SHA512373b4223ed667adf11775177c229d6e4e4b8f73ef244a8ba46a22f3ba39174e881f809bbbb534f449feec487b62f77ed75a8cb2c9d6beac6c48af126685639e2