Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 22:03
Static task
static1
Behavioral task
behavioral1
Sample
ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe
Resource
win7-20241023-en
General
-
Target
ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe
-
Size
3.0MB
-
MD5
136e82403122d1036228ef096413d27a
-
SHA1
530e7a1ab9c54b16aca88c410c6a6d6f9180cb4b
-
SHA256
ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3
-
SHA512
0b0642b8b04b964d7875b62c20c0d5230cb3b3cf6239543fda3021a0f940aded0609c388bad7c7c6735dc03e1f578e4fcd7a1d9f3a2942fba1173bcf55ebc8c7
-
SSDEEP
49152:r1bpc4t5xZJ2MwuEi6FHGCsPdCL+mwHL:r1/t5t2MOpHGxFCL+
Malware Config
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Extracted
litehttp
v1.0.9
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral2/memory/4468-488-0x0000000000950000-0x0000000000DC2000-memory.dmp healer behavioral2/memory/4468-489-0x0000000000950000-0x0000000000DC2000-memory.dmp healer behavioral2/memory/4468-584-0x0000000000950000-0x0000000000DC2000-memory.dmp healer -
Healer family
-
Litehttp family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" c1ba2fd1b8.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c1ba2fd1b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c1ba2fd1b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c1ba2fd1b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c1ba2fd1b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c1ba2fd1b8.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c1ba2fd1b8.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c1ba2fd1b8.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications c1ba2fd1b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" c1ba2fd1b8.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d1adfdd8ff.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bd46c2c23a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1ba2fd1b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TJ9YG2U8BJM54ZFT.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GQ5IH884TKK0IEYRLHWMSQDG.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rapes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ v6Oqdnc.exe -
Downloads MZ/PE file 11 IoCs
flow pid Process 35 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 88 3456 d1adfdd8ff.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe 44 2764 rapes.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TJ9YG2U8BJM54ZFT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GQ5IH884TKK0IEYRLHWMSQDG.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bd46c2c23a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1ba2fd1b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion v6Oqdnc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d1adfdd8ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d1adfdd8ff.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1ba2fd1b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rapes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TJ9YG2U8BJM54ZFT.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bd46c2c23a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GQ5IH884TKK0IEYRLHWMSQDG.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation TJ9YG2U8BJM54ZFT.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation rapes.exe Key value queried \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Control Panel\International\Geo\Nation dll32.exe -
Executes dropped EXE 17 IoCs
pid Process 1344 TJ9YG2U8BJM54ZFT.exe 2764 rapes.exe 2700 rapes.exe 856 ktxzLhN.exe 2604 dll32.exe 3456 d1adfdd8ff.exe 3784 bd46c2c23a.exe 860 GQ5IH884TKK0IEYRLHWMSQDG.exe 3868 edf4838555.exe 4468 c1ba2fd1b8.exe 5664 zY9sqWs.exe 6024 tempdatalogger.exe 6124 rapes.exe 5376 v6Oqdnc.exe 5912 MCxU5Fj.exe 5624 MCxU5Fj.exe 2860 ce4pMzk.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine GQ5IH884TKK0IEYRLHWMSQDG.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine c1ba2fd1b8.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine TJ9YG2U8BJM54ZFT.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine v6Oqdnc.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine rapes.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine d1adfdd8ff.exe Key opened \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\Software\Wine bd46c2c23a.exe -
Loads dropped DLL 2 IoCs
pid Process 2604 dll32.exe 6024 tempdatalogger.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c1ba2fd1b8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c1ba2fd1b8.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d1adfdd8ff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107160101\\d1adfdd8ff.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bd46c2c23a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107170101\\bd46c2c23a.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\edf4838555.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107180101\\edf4838555.exe" rapes.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1ba2fd1b8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\10107190101\\c1ba2fd1b8.exe" rapes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 196 raw.githubusercontent.com 65 raw.githubusercontent.com 66 raw.githubusercontent.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023ce2-128.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 5824 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 1344 TJ9YG2U8BJM54ZFT.exe 2764 rapes.exe 2700 rapes.exe 3456 d1adfdd8ff.exe 3784 bd46c2c23a.exe 860 GQ5IH884TKK0IEYRLHWMSQDG.exe 4468 c1ba2fd1b8.exe 6124 rapes.exe 5376 v6Oqdnc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5912 set thread context of 5624 5912 MCxU5Fj.exe 153 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\rapes.job TJ9YG2U8BJM54ZFT.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5732 5912 WerFault.exe 152 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language edf4838555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TJ9YG2U8BJM54ZFT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd46c2c23a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1ba2fd1b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zY9sqWs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MCxU5Fj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rapes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v6Oqdnc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1adfdd8ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GQ5IH884TKK0IEYRLHWMSQDG.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage edf4838555.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edf4838555.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 5892 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 1296 taskkill.exe 4392 taskkill.exe 244 taskkill.exe 1216 taskkill.exe 3780 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000_Classes\Local Settings firefox.exe Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000_Classes\Local Settings rapes.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 1344 TJ9YG2U8BJM54ZFT.exe 1344 TJ9YG2U8BJM54ZFT.exe 2764 rapes.exe 2764 rapes.exe 2700 rapes.exe 2700 rapes.exe 856 ktxzLhN.exe 856 ktxzLhN.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 2604 dll32.exe 3456 d1adfdd8ff.exe 3456 d1adfdd8ff.exe 3456 d1adfdd8ff.exe 3456 d1adfdd8ff.exe 3456 d1adfdd8ff.exe 3456 d1adfdd8ff.exe 3784 bd46c2c23a.exe 3784 bd46c2c23a.exe 860 GQ5IH884TKK0IEYRLHWMSQDG.exe 860 GQ5IH884TKK0IEYRLHWMSQDG.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 4468 c1ba2fd1b8.exe 4468 c1ba2fd1b8.exe 4468 c1ba2fd1b8.exe 4468 c1ba2fd1b8.exe 4468 c1ba2fd1b8.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe 6024 tempdatalogger.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
description pid Process Token: SeDebugPrivilege 856 ktxzLhN.exe Token: SeDebugPrivilege 2604 dll32.exe Token: SeDebugPrivilege 4392 taskkill.exe Token: SeDebugPrivilege 244 taskkill.exe Token: SeDebugPrivilege 1216 taskkill.exe Token: SeDebugPrivilege 3780 taskkill.exe Token: SeDebugPrivilege 1296 taskkill.exe Token: SeDebugPrivilege 4704 firefox.exe Token: SeDebugPrivilege 4704 firefox.exe Token: SeDebugPrivilege 4468 c1ba2fd1b8.exe Token: SeDebugPrivilege 5824 tasklist.exe Token: SeDebugPrivilege 6024 tempdatalogger.exe Token: SeDebugPrivilege 2860 ce4pMzk.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 4704 firefox.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe 3868 edf4838555.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4704 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4344 wrote to memory of 1344 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 95 PID 4344 wrote to memory of 1344 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 95 PID 4344 wrote to memory of 1344 4344 ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe 95 PID 1344 wrote to memory of 2764 1344 TJ9YG2U8BJM54ZFT.exe 96 PID 1344 wrote to memory of 2764 1344 TJ9YG2U8BJM54ZFT.exe 96 PID 1344 wrote to memory of 2764 1344 TJ9YG2U8BJM54ZFT.exe 96 PID 2764 wrote to memory of 856 2764 rapes.exe 100 PID 2764 wrote to memory of 856 2764 rapes.exe 100 PID 856 wrote to memory of 2604 856 ktxzLhN.exe 101 PID 856 wrote to memory of 2604 856 ktxzLhN.exe 101 PID 2764 wrote to memory of 3456 2764 rapes.exe 108 PID 2764 wrote to memory of 3456 2764 rapes.exe 108 PID 2764 wrote to memory of 3456 2764 rapes.exe 108 PID 2764 wrote to memory of 3784 2764 rapes.exe 113 PID 2764 wrote to memory of 3784 2764 rapes.exe 113 PID 2764 wrote to memory of 3784 2764 rapes.exe 113 PID 3456 wrote to memory of 860 3456 d1adfdd8ff.exe 114 PID 3456 wrote to memory of 860 3456 d1adfdd8ff.exe 114 PID 3456 wrote to memory of 860 3456 d1adfdd8ff.exe 114 PID 2764 wrote to memory of 3868 2764 rapes.exe 115 PID 2764 wrote to memory of 3868 2764 rapes.exe 115 PID 2764 wrote to memory of 3868 2764 rapes.exe 115 PID 3868 wrote to memory of 4392 3868 edf4838555.exe 116 PID 3868 wrote to memory of 4392 3868 edf4838555.exe 116 PID 3868 wrote to memory of 4392 3868 edf4838555.exe 116 PID 3868 wrote to memory of 244 3868 edf4838555.exe 118 PID 3868 wrote to memory of 244 3868 edf4838555.exe 118 PID 3868 wrote to memory of 244 3868 edf4838555.exe 118 PID 3868 wrote to memory of 1216 3868 edf4838555.exe 120 PID 3868 wrote to memory of 1216 3868 edf4838555.exe 120 PID 3868 wrote to memory of 1216 3868 edf4838555.exe 120 PID 3868 wrote to memory of 3780 3868 edf4838555.exe 122 PID 3868 wrote to memory of 3780 3868 edf4838555.exe 122 PID 3868 wrote to memory of 3780 3868 edf4838555.exe 122 PID 3868 wrote to memory of 1296 3868 edf4838555.exe 124 PID 3868 wrote to memory of 1296 3868 edf4838555.exe 124 PID 3868 wrote to memory of 1296 3868 edf4838555.exe 124 PID 3868 wrote to memory of 1912 3868 edf4838555.exe 126 PID 3868 wrote to memory of 1912 3868 edf4838555.exe 126 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 1912 wrote to memory of 4704 1912 firefox.exe 127 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 PID 4704 wrote to memory of 4352 4704 firefox.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe"C:\Users\Admin\AppData\Local\Temp\ecdf6a1f1edacf783d09e9ff7836e0c41964bf394a4710d278f4c07a5fd586f3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\TJ9YG2U8BJM54ZFT.exe"C:\Users\Admin\AppData\Local\Temp\TJ9YG2U8BJM54ZFT.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"C:\Users\Admin\AppData\Local\Temp\10106910101\ktxzLhN.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\dll32.exe"C:\Users\Admin\AppData\Local\Temp\dll32.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp66EE.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmp66EE.tmp.bat6⤵PID:5732
-
C:\Windows\system32\chcp.comchcp 650017⤵PID:5748
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 2604"7⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:5824
-
-
C:\Windows\system32\find.exefind ":"7⤵PID:5832
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak7⤵
- Delays execution with timeout.exe
PID:5892
-
-
C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"C:\Users\Admin\AppData\Roaming\AdminUserCash\tempdatalogger.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107160101\d1adfdd8ff.exe"C:\Users\Admin\AppData\Local\Temp\10107160101\d1adfdd8ff.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\GQ5IH884TKK0IEYRLHWMSQDG.exe"C:\Users\Admin\AppData\Local\Temp\GQ5IH884TKK0IEYRLHWMSQDG.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107170101\bd46c2c23a.exe"C:\Users\Admin\AppData\Local\Temp\10107170101\bd46c2c23a.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3784
-
-
C:\Users\Admin\AppData\Local\Temp\10107180101\edf4838555.exe"C:\Users\Admin\AppData\Local\Temp\10107180101\edf4838555.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:244
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking5⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking6⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 27352 -prefMapSize 244628 -appDir "C:\Program Files\Mozilla Firefox\browser" - {864ac6ba-02a5-4552-b337-f4b684c2d4e7} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" gpu7⤵PID:4352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2484 -parentBuildID 20240401114208 -prefsHandle 2392 -prefMapHandle 2376 -prefsLen 28272 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e5f61d4-c28f-4297-8c58-f7d265099cfd} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" socket7⤵PID:552
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3024 -childID 1 -isForBrowser -prefsHandle 3004 -prefMapHandle 3000 -prefsLen 22684 -prefMapSize 244628 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1bd66725-8b2b-4da3-b7f4-f7fccc020711} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab7⤵PID:2296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3892 -childID 2 -isForBrowser -prefsHandle 3904 -prefMapHandle 3900 -prefsLen 32762 -prefMapSize 244628 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {407bc981-5986-4e26-ae8e-c55cab40f6e4} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab7⤵PID:3476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4712 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4600 -prefMapHandle 4620 -prefsLen 32762 -prefMapSize 244628 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e91d66e6-c647-4120-abad-b02ea183b488} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" utility7⤵
- Checks processor information in registry
PID:5348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5312 -childID 3 -isForBrowser -prefsHandle 5304 -prefMapHandle 5300 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f17871aa-e9fd-4ca7-bd0f-268f58354f00} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab7⤵PID:6040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5536 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5460 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a530f856-3e8d-4258-8897-41c4d0d212e2} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab7⤵PID:6052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 5 -isForBrowser -prefsHandle 5656 -prefMapHandle 5664 -prefsLen 27083 -prefMapSize 244628 -jsInitHandle 1220 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b9a042d2-dfa8-45ac-9ba5-aa36800aea20} 4704 "\\.\pipe\gecko-crash-server-pipe.4704" tab7⤵PID:6064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107190101\c1ba2fd1b8.exe"C:\Users\Admin\AppData\Local\Temp\10107190101\c1ba2fd1b8.exe"4⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe"C:\Users\Admin\AppData\Local\Temp\10107200101\zY9sqWs.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5664
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\10107211121\PcAIvJ0.cmd"4⤵
- System Location Discovery: System Language Discovery
PID:5952
-
-
C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe"C:\Users\Admin\AppData\Local\Temp\10107220101\v6Oqdnc.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5376
-
-
C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5912 -
C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"C:\Users\Admin\AppData\Local\Temp\10107230101\MCxU5Fj.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5624
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5912 -s 8005⤵
- Program crash
PID:5732
-
-
-
C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe"C:\Users\Admin\AppData\Local\Temp\10107240101\ce4pMzk.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
C:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exeC:\Users\Admin\AppData\Local\Temp\bb556cff4a\rapes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6124
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5912 -ip 59121⤵PID:5896
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5ca46397a8350ab60f3bd7a55651e0f6b
SHA10de049ab47f4722f7e37eee0e4a1d4efd42c3140
SHA2569f54d10875815fe4ee56555fa20b60b38a410f3537c24d53752f824e2c9bdc32
SHA51209ee3af7de57a6ee2b87289e52ce894d826f7da9eb98fd6fcecca81b8db72a2b6b2b062449ce61b634285c1a822c4d841d40cbf3c14a46e2cf6da4ea4acb07dd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\v82jw7ls.default-release\cache2\entries\ADF5BD09EB688DAB1F35EE02E8C35329D0E4AD89
Filesize13KB
MD53f47a20f902ce2456b77450e6c938627
SHA1d960adb642cab9b25f7bd95fa2f83b5eeafb5e1c
SHA256ae03acedde63343e127c2d4b61a58c114c26c75870d8cb7870e03b9308feb5ed
SHA5121b07e984601cc952531c22d8612403d6156bb7146523f2933599bef8f6ae30ab68d593c6485d3925c4daa502820836bf5ef9ea70d71d677a0be059d2b3a8bfb8
-
Filesize
15.0MB
MD535a4dfb5f0308d20b1e5bf26e0a70509
SHA10c72b35b74dadbce4a95c034968913de271aae06
SHA25640d3baeb6df3e2cd4eed207e773b21989b86ef547de12a748529c2b559025339
SHA51251b8bf5583a256015daaa8caa9c9868c792ef4a1157b89a6880b365c4c5a1c7416abc2b1fcdde9d1d5d9bb7aaa1c617d5b34124a582ec042ac5a2afa064c60d9
-
Filesize
3.1MB
MD57c169698effcdd45b7cbd763d28e87f5
SHA14f9db666d66255cd7ca2b0973ff00eae8b155f7a
SHA256c7fd445ebedd5cfa9a01daccc7c5771a88f1719b6dbfe16c9f0334fc4371250b
SHA51258335071c6f27e72c8cd505859c9b122ff354395b239697311c1ce17f224c58dd9e2894fbc874c835866a299b3ae9ffab767195a253698fed0d39f3fb15ff8e3
-
Filesize
1.7MB
MD52012699a5e85cd283323c324aa061bc7
SHA169d93116908bf4b6c61a9cb2d3f50a5fbb8cec0f
SHA256937ff3f78062e3aaad013b88bb6e807770d40bb65e538eee9c5de6b1487510b5
SHA512729e7f19b8dc678a8f8912a9ab64169391259fe9d129ba99ef91360f82f81b2c2e628d68a4d5d9c2e4e3fe9e5c09ff295e6021bb3d23a107d6ab59a361d66683
-
Filesize
949KB
MD5e935a122d4c4e9c1b44368821a5154ff
SHA1c93e4b9fb9563cb04a9cd39c75220eaf6007f98f
SHA256161b8b9257159ff8789d47b9a4f5c4b7c6a6e66470392898a8c301348d28cbb4
SHA51275a94d4c73fb917adaae4cc2c8e3a74bc4520cd45b87af146b53aca42b194cd26126ad4a2db5efad2aaa41e2874f8b71d58ebab8752c73039e233c8cd94a7e7f
-
Filesize
1.7MB
MD5e787e8998f5306a754d625d7e29bbeb5
SHA114e056dbf0b3991664910ee3a1d23a4bb2c0253d
SHA25693339b4579800e861b8606cd011c6d919790c72691346eede1aa5d116514672d
SHA51230463019ed1ba9aa0a46623f9068b842161c03f03bbd98da21584abf9c913beade0df4ae758c13f20dcd7937a26f1a6c7c5e6f785c75ce05ea500a7fe6d240f6
-
Filesize
361KB
MD52bb133c52b30e2b6b3608fdc5e7d7a22
SHA1fcb19512b31d9ece1bbe637fe18f8caf257f0a00
SHA256b8e02f2bc0ffb42e8cf28e37a26d8d825f639079bf6d948f8debab6440ee5630
SHA51273229885f8bf4aace4671b819a8487f36acb7878cd309bdf80b998b0a63584f3063364d192b1fc26fa71b9664908fe290a00f6898350c30f40d5f2a2d2efe51f
-
Filesize
275B
MD5c203adcd3b4b1717be1e79d7d234f89c
SHA1a0c726c32766f5d3e3de1bdc9998da2bb2a657e4
SHA256bc953bccc3974ff2a40fd6ce700e499d11bfd2463014786a4cb0f7bac6568ad8
SHA512724f920d5e5f31155629155184a1ccf6299c72da04362062512c154e27bed136292a0af51f423e8e05d8f80426b72f679a01ab9662d4da6ffc06cfcbcd005368
-
Filesize
2.0MB
MD56006ae409307acc35ca6d0926b0f8685
SHA1abd6c5a44730270ae9f2fce698c0f5d2594eac2f
SHA256a5fa1579a8c1a1d4e89221619d037b6f8275f34546ed44a020f5dfcee3710f0b
SHA512b2c47b02c972f63915e2e45bb83814c7706b392f55ad6144edb354c7ee309768a38528af7fa7aeadb5b05638c0fd55faa734212d3a657cd08b7500838135e718
-
Filesize
415KB
MD5641525fe17d5e9d483988eff400ad129
SHA18104fa08cfcc9066df3d16bfa1ebe119668c9097
SHA2567a87b801af709e8e510140f0f9523057793e7883ec2b6a4eab90fcf0ec20fd4a
SHA512ee92bc34e21bb68aeda20b237e8b8e27f95e4cc44f5fd9743b52079c40f193cc342f8bb2690fd7ab3624e1690979118bd2e00a46bda3052cbd76bc379b87407e
-
Filesize
48KB
MD5d39df45e0030e02f7e5035386244a523
SHA19ae72545a0b6004cdab34f56031dc1c8aa146cc9
SHA256df468fc510aec82c827987f54b824b978dd71301f93d18d71e704727d6dfdfa2
SHA51269866ba5b53d1183a0899e3d22ff06111ae2e8df429beeb853c89f3ed0afb015dd4139b1c507566ffb0fe171a4ff1b318247b7a568dc492d9f71266f5c848a64
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.8MB
MD5f42f59d1a7bc1d3fcd51d41a76974175
SHA108591f2269d3d8c8099beaa0f4676ae8b0f7bb1c
SHA256ad14a834ed7d0994d38ec0374f26f4837e94fe5b54d15442c5b2fb796365dc38
SHA51238c5cc4567b19c637b58874dd408d5994c168f071962d7008889b9e360667301107a9efd7e1ee326e53bddbec5f536d562d91c7170761127f568d3175544eaae
-
Filesize
5.7MB
MD5ffb5c5f8bab4598fada3bbf92d02d66d
SHA1ae8096c1f160c97874179ea878a61f69bfb9941a
SHA256f3aa764be17f1a197f94b949cfd88f99c2d67e9fec1f53046ef1b6189f594da1
SHA512902e8a95b964ef3a48504dcdb3c4f0615212eb942476ec26b88e02a39cbaaf866f3fcbe5cd4374342b80aae9a7e17092a28dbe1d53630493a0b0cee8152a4ccf
-
Filesize
278B
MD526b8a18092d5b4b27ac16ad92ddaabe7
SHA1e0b66324e2fe5c6710d0ed03160579d8cd28c99b
SHA256b52ebbc9569bd35da800599659649877d7760a740a6c93df436abef0e1e649f9
SHA51228b9b3e581252fa19582dd69f444771e831d141b518e39c3aa45ca5d7f90197b96840accc051e1d1f15a79815a67f9394156c2040626f937ef51bd70cc0423bf
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
10.2MB
MD5b1ec1d46be505e62f7f9c73da3e841cc
SHA18250fd0c8d26eceb095c57b4bc454c4ec0b20e1a
SHA256907b2fc8059bc6095c9e64a507ad9603caf9d85c8100cc43eeaf66a21db7b34c
SHA512064d8af634b3a408f2fa08d65cb9af07944ed45807b7c596e21c9aa0303a361b932ef04fbd1c44ccfcc7a51d7bff1cc3c22c7b6920bf4e37040443707c9519a8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin
Filesize8KB
MD56387adce098e30b69b2371b56c7369bf
SHA169b07565b14d6c49ad69873794460b77ab9bae59
SHA2566cce423fab478f5917998f41ffde0b933ee69eed035b04966ad5cc6cbca2767b
SHA5128d3fdf46f875bd26647ba9adea421bcd18b2de7de56b630652d509039a68b780f933a220ca3250b7dd01d114171c3da93d623b64ab64582ea24730b9cb32d667
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin
Filesize13KB
MD58cbda8f396f12ebd31e3cd4ff7579a6d
SHA1b51936f93fef74540de41c6dd67e348462a7d42f
SHA256899621a9d726fc5fd09a6bd4b2100df5c7806b6ef38e8351ea04993ea8873db3
SHA51233a724ba15cf14485e728840352a6462e34b631fdfbb815f07c1bdd75af5be0e1e61f92f897a6e9cdae9d60e909fb09f4c5ae68b413ed377175fea9943976d32
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\AlternateServices.bin
Filesize15KB
MD5607777dd2e92f16ec4b867e0f71b9d17
SHA134a987985e7ab7a35805ecd13a70ce2bb7467655
SHA25674bca530db5ceab18997112de20b90356e7b48b41126601e2d86d260457afdd7
SHA512d2bc7e078bae940ba3ecfcaacc2bc30732db928a44f1e7380c419d4538c0bed77cbaab004e57a40caf8e21ddace725da1d46dca09a9fdd1833980252bb521835
-
Filesize
224KB
MD509ad8932c241e954dd413a20c0e27eb8
SHA1e7311daf7131c06bb0ec53753d523d7e18e1680c
SHA256c65ac6ec0c75b7d0eb1ac1e5e5bbbe3601c05eb07ee1a071eee5c4473da26ff8
SHA5127d87dafedea20cec0577de95a67c2169ca8450b9bcef366b36c452e000e085115446f35a59b42fe0d4db6aabd4c525609b9f52aa90d9dda62a4427b12464f863
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD574caa95eaf8ed3eb0ce53d627c822211
SHA1d50a5ab1560306f8c0c9d0d7f3641389f0f1b34c
SHA256d34ea89540ac62c0658bfd077b2ceff0786ba8574371436655777265407b726d
SHA512bc68e37d8112eb8456d97f6c81341f09778db96aa557516f9409f597a97df96730f924519119c214c3153b519f141f0b9f00a756ad19be12cfe1b071b34146d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD5ef02bea748ccd11d87d8d5fb58515b78
SHA198d4c44d9f4e38b2a1584aa6786617d9b0f539d1
SHA256c669aed4a2aa558e92fd71cca0688d61eee7ffbb61e04fb5ad8b39134b52806e
SHA5121719aa02231d9e3b32579b84b98a4ea60539a6b40b5410d2b1c105a38e8d1e75ec70e73313bf71ebcc8d388589438d1d77bc9ed2a4cedbdd8bed44de6a233ed4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize27KB
MD50bebb38898e58689209cb3118ef0af37
SHA170327aba05060fb9c1de8bb547e00fb0902c08b1
SHA25644990500ec265c6ec87f2a18aec1663042d670ce37f766afeafee0f4814d7394
SHA5123b788a15c605258626a7286b45b1c2767a3e463b122a5beefd9c2d31a9275a091db98fd48741d40084504bcbd6613185ea8157cc1925aa3395bb8d64407cae4c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5031b23810c5fdda07832e57f6e6c935c
SHA1f9ff30eccafeb708a567a44c41d9f66323196104
SHA256cfad4f7cd65a98e86877d3bf4c3368fc2cbc5e8bb193ea8b2e41a4cea7ae9c77
SHA512706393166fab96fad6e5ecd8e69649a5ce749fe938241a09c0ccb2633827a3a7e46e19edaf601982542d589d1a3eb61b53b77bac1a52feb2147b9d1c03424da1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\33c2d97b-f4b6-4cad-93f1-2632b1e3ec3b
Filesize671B
MD51a86a29ab095babf8550babfbc6e6cd6
SHA1e05d5e840e876fd0461ac125021624831ef0c838
SHA256873ba1351df64e2e5f1c7b699c95a7e125dea8c5f649d77ae3539f20110964fc
SHA512d01ecd49d1581493ae0a778f4d4d5cae1321ba935941d15a0c900b974348bf98b6ecff9aa1471636a77ebcc02941a420d37ae0423383ca552a1a35e3c63cee88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\94ab238c-efa6-4544-be29-8ce9ad8eb521
Filesize982B
MD5964b10eab2ce1e8dbe7325b07630169c
SHA10be8dee2db3c861bec3b1a34deb7b6a9c802fd3b
SHA25620d5eacbff47c3aa516d95e1846f8b275ec697886724a46a9b8d737727a25d8b
SHA5125d46832a5ab30fecee2c4c7b114511e1cb52a746aea3cfa5d0e2efc69092ac1c908b20ec41efe94ba6b106d67f3b028e201c694de5286967744059f92c163c74
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\datareporting\glean\pending_pings\d9f86734-2860-48dd-b4c4-546e831a5da7
Filesize26KB
MD5f8074aa1d77ad3983cbeae94491772cf
SHA1765cc2b4dd7615f4c5af4999d4ac5900c0410923
SHA256c587f2b450a57081a481ea03dba3785f042d32fa83de8fa25b7ace45a31abc68
SHA512b92099853e66b006ef36aab25fecc14f3477df44ad7b5c5f7d951addddabd7857ee6b0edb60435dd5101273f479bc3ba89d15f03e983822fe34577bd2196d035
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\v82jw7ls.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize8.9MB
MD5d4202efd2f712b7bd90636bad8a68c33
SHA1d981fc6d62d68ba1a348341c48ca027e9178a617
SHA25682d84bd476f92efddc9ddfed2229c6b416d4f82f0c878f3d79e55bc7020d054b
SHA512406ae9feb3a0d22911df91a7e58c1acabf91fea505a962321c2a80ec6c13c39767d1cd15d8397f1aece75292d3ba11353915fbfc7e5d8fbf89ba2f3a44a63d3c
-
Filesize
11KB
MD50dd0911c7e41f575e7724c8c6c6d221d
SHA11f63ce756c06d896766a55b4a5023a875ebf91dd
SHA256c34edc991a0975617c74830dfcce0ea0ed1822c49c9ef9936b053d1d7865cfd2
SHA512568ee30ea1187cf124ccf3d61d3e3a1f50503ed53cd983cf7a44cf517300ddea537b4207eeeda24d0b2c211e53230165a70fe59cd2ec95b3e6f264333be36784
-
Filesize
13KB
MD56668e3fd03ced4ef73a4520a8d1a1866
SHA18551d552b7b664164c43dcbf6d64af44e56ca636
SHA2563d88299bc2ce768347cc252796b306bfdfca1b1f770e4f6e086745916471dbf8
SHA512f45f5b23a6c6b986eb5fe9a7e2303aafc223edc898cc229032d613671fe8924bcc9aa1d972253e56fc577e09d1dd9c7079429086d4d7e513d81274173686cc73
-
Filesize
12KB
MD5b88442af2ee96873e690091a9602b02f
SHA1fdc2708f2f4df7b58987bc7dd53163877fa7e3fb
SHA256857979ebb1f26a27e6d7588faa2557cbc3f7112c98a68c2b4cfaaf3f61c1271a
SHA512c47238cfef5caac65ac6311bb4822c8a51f170a614848e3c5420b929778165a767c81135972b06ba69c0020874d06970e62f6186d59366fda559c9c0c2a0ce23
-
Filesize
9KB
MD5736e417580081b9ecc5b9bf8d688cabe
SHA19fa2416ba51ae6d9b16b8ee52d218effbde75a66
SHA256352307b8b1fe95aef58d39df13d304f246c0bfdd81503b916b5eb16c4d950fde
SHA512ee37ebafc27ad919dabaf972b9c4d203458390873e7fe8164852ed77013c155365071ea8530f0619d7480365d5481b297fbb3f274277fa23026d50b9f29c73c0
-
Filesize
10KB
MD55b147114af3924ee73fbf2d800d9e165
SHA14409303227a1aa78ffd04d3df548f7ec4adfc7e6
SHA256e9abdf98be871531baf9e03c4238c8ead3a76f65515f4618c37ff9e17d9a958d
SHA512d65b94128d55c8b26363a1853431c95bf52a55cd8d31a88df627f623029ebe75fc027aeb8d673cff59aa5bf8f1801b02476cead0464135e110a7ae9cfb2be518
-
Filesize
9KB
MD5d3cf9620b05f30737d30a934922619bd
SHA108fc86b6a4b982322a6fe7dcb368106d540a7e06
SHA256c882ff0636faa95348eba30a6868c84ee40712bbc46182dcf37cef9a558a1f0a
SHA51275160c3b30b620504c4dc762a45c98cb6246153636165800edee36c1f8514c191fd3fd84779be456167e5b061af70b00201ca515f5b48a77d07dc04fcf3de28e