Non-Firefox Process Accessing Firefox Profile Directory
This analytic detects non-Firefox processes accessing the Firefox profile directory, potentially indicating malware attempting to harvest sensitive user data like login credentials, browsing history, and cookies.
This detection focuses on identifying unauthorized access to Firefox profile directories. The Firefox profile directory stores sensitive user data, including login credentials, browsing history, and cookies. When a non-Firefox process accesses this directory, it could be an indicator of malicious activity, such as a Remote Access Trojan (RAT) or other malware attempting to steal user information. The analytic leverages Windows Security Event logs, specifically event code 4663, to monitor access attempts. This is relevant because successful credential theft can lead to account compromise, data breaches, and further propagation of malware within the network. The threat encompasses a broad range of malware families, including stealers (Azorult, RedLine Stealer, 0bj3ctivity Stealer), RATs (Remcos, Quasar RAT, Warzone RAT), keyloggers (Snake Keylogger, VIP Keylogger), and other malware like DarkGate, NjRAT, AgentTesla, and Lokibot. The activity has been observed in campaigns such as CISA AA23-347A and the 3CX Supply Chain Attack.
Attack Chain
- The user executes a malicious file, potentially delivered via phishing or drive-by download (not covered in source).
- The malicious file executes and establishes persistence on the system.
- The malware attempts to access the Firefox profile directory, located at
*\AppData\Roaming\Mozilla\Firefox\Profiles*. - Windows Security Event 4663 is generated, logging the access attempt to the Firefox profile directory.
- The malware reads sensitive data, such as login credentials, cookies, and browsing history, from the profile directory.
- The stolen data is exfiltrated to a command-and-control (C2) server.
- The attacker uses the stolen credentials to gain unauthorized access to user accounts and sensitive systems.
Impact
Successful exploitation and credential theft can lead to a wide range of negative outcomes, including unauthorized access to sensitive data, financial fraud, and further compromise of systems within the organization. The impact can range from individual user account compromise to large-scale data breaches affecting thousands of users. Industries heavily reliant on web-based applications and sensitive user data, such as finance, healthcare, and e-commerce, are particularly vulnerable. The consequences include financial losses, reputational damage, and legal liabilities.
Recommendation
- Enable “Audit Object Access” in Group Policy and configure it to log both success and failure events for object access to activate the underlying log source required for this detection.
- Deploy the provided Sigma rule to your SIEM to detect non-Firefox processes accessing Firefox profile directories.
- Investigate any alerts generated by the Sigma rule, paying close attention to the
ProcessNameandObjectNameto identify potentially malicious processes and the specific profile data being accessed. - Review and update your organization’s security policies to restrict unauthorized access to sensitive user data.
Detection coverage 2
Non Firefox Process Access Firefox Profile Dir
highDetects non-Firefox processes accessing the Firefox profile directory, indicating potential credential theft or malware activity.
Suspicious Process Accessing Firefox Profile Directory via Command Line
mediumDetects command-line processes accessing the Firefox profile directory, potentially indicating credential theft or malware activity.
Detection queries are kept inside the platform. Get full rules →