Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 21:25
Static task
static1
Behavioral task
behavioral1
Sample
fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe
Resource
win7-20240708-en
General
-
Target
fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe
-
Size
1.8MB
-
MD5
e2907853e63eadebb2c9bddd216a7685
-
SHA1
e96e683b71f13711ff8fb15a1e4a1ca6cc5fa1eb
-
SHA256
fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7
-
SHA512
1ce2cb97967437c8f2c2e2d97b82c11867679f320733a2f924bc2ff985d73a7c5d7c4792abd9058d63a843e3b4f48520801c6864f708447ddbf3e238d127cbcd
-
SSDEEP
49152:1VUJq7xhIRlJyMAu8up+6AEr7H3p6Xmaq:EqV+lJ/wM/H52m
Malware Config
Extracted
amadey
4.41
c7817d
http://31.41.244.10
-
install_dir
0e8d0864aa
-
install_file
svoutse.exe
-
strings_key
5481b88a6ef75bcf21333988a4e47048
-
url_paths
/Dem7kTu/index.php
Extracted
stealc
nord
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Extracted
stealc
kora
http://185.215.113.100
-
url_path
/e2b1563c6670f193.php
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4614f4744b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11e4b82c05.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ svoutse.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4614f4744b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svoutse.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4614f4744b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11e4b82c05.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11e4b82c05.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation svoutse.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 11e4b82c05.exe -
Executes dropped EXE 6 IoCs
pid Process 4948 svoutse.exe 2564 4614f4744b.exe 1108 966e7d4d45.exe 1928 11e4b82c05.exe 5320 svoutse.exe 4120 svoutse.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine 4614f4744b.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine 11e4b82c05.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine svoutse.exe Key opened \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Software\Wine fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4614f4744b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000009001\\4614f4744b.exe" svoutse.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\966e7d4d45.exe = "C:\\Users\\Admin\\1000010002\\966e7d4d45.exe" svoutse.exe Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\11e4b82c05.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1000012001\\11e4b82c05.exe" svoutse.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/1928-430-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-429-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-447-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-473-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-1241-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2585-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2620-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2628-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2630-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2632-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2636-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2638-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2640-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe behavioral2/memory/1928-2647-0x0000000000E80000-0x0000000001402000-memory.dmp autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 4948 svoutse.exe 2564 4614f4744b.exe 1928 11e4b82c05.exe 5320 svoutse.exe 4120 svoutse.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\svoutse.job fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svoutse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4614f4744b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 966e7d4d45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11e4b82c05.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 4948 svoutse.exe 4948 svoutse.exe 2564 4614f4744b.exe 2564 4614f4744b.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 5320 svoutse.exe 5320 svoutse.exe 4120 svoutse.exe 4120 svoutse.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 720 firefox.exe Token: SeDebugPrivilege 720 firefox.exe Token: SeDebugPrivilege 720 firefox.exe Token: SeDebugPrivilege 720 firefox.exe Token: SeDebugPrivilege 720 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 720 firefox.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe 1928 11e4b82c05.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 720 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2184 wrote to memory of 4948 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 87 PID 2184 wrote to memory of 4948 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 87 PID 2184 wrote to memory of 4948 2184 fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe 87 PID 4948 wrote to memory of 2564 4948 svoutse.exe 90 PID 4948 wrote to memory of 2564 4948 svoutse.exe 90 PID 4948 wrote to memory of 2564 4948 svoutse.exe 90 PID 4948 wrote to memory of 1108 4948 svoutse.exe 93 PID 4948 wrote to memory of 1108 4948 svoutse.exe 93 PID 4948 wrote to memory of 1108 4948 svoutse.exe 93 PID 4948 wrote to memory of 1928 4948 svoutse.exe 95 PID 4948 wrote to memory of 1928 4948 svoutse.exe 95 PID 4948 wrote to memory of 1928 4948 svoutse.exe 95 PID 1928 wrote to memory of 1776 1928 11e4b82c05.exe 98 PID 1928 wrote to memory of 1776 1928 11e4b82c05.exe 98 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 1776 wrote to memory of 720 1776 firefox.exe 100 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 PID 720 wrote to memory of 1496 720 firefox.exe 101 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe"C:\Users\Admin\AppData\Local\Temp\fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\1000009001\4614f4744b.exe"C:\Users\Admin\AppData\Local\Temp\1000009001\4614f4744b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564
-
-
C:\Users\Admin\1000010002\966e7d4d45.exe"C:\Users\Admin\1000010002\966e7d4d45.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Users\Admin\AppData\Local\Temp\1000012001\11e4b82c05.exe"C:\Users\Admin\AppData\Local\Temp\1000012001\11e4b82c05.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password4⤵
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" https://accounts.google.com/ServiceLogin?service=accountsettings&continue=https://myaccount.google.com/signinoptions/password5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2004 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {944d6052-99f8-450e-8981-f75619cbb694} 720 "\\.\pipe\gecko-crash-server-pipe.720" gpu6⤵PID:1496
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2368 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {57439a1d-1724-421b-94c6-1f05a560bb5b} 720 "\\.\pipe\gecko-crash-server-pipe.720" socket6⤵PID:3340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2908 -childID 1 -isForBrowser -prefsHandle 2804 -prefMapHandle 3168 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62c913b3-7ddc-4dc5-b557-a49b008a89ed} 720 "\\.\pipe\gecko-crash-server-pipe.720" tab6⤵PID:2196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4004 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 2756 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8e706f0a-413d-45ba-88fa-eb4ca3456da7} 720 "\\.\pipe\gecko-crash-server-pipe.720" tab6⤵PID:2980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4692 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4716 -prefMapHandle 4684 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {578f295a-5354-4127-918d-9b64906bab2a} 720 "\\.\pipe\gecko-crash-server-pipe.720" utility6⤵
- Checks processor information in registry
PID:5404
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5256 -childID 3 -isForBrowser -prefsHandle 5248 -prefMapHandle 5188 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e2b1fbd-b917-431d-8f79-99d15f597a7a} 720 "\\.\pipe\gecko-crash-server-pipe.720" tab6⤵PID:5520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5404 -childID 4 -isForBrowser -prefsHandle 5260 -prefMapHandle 5264 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9d732ae4-42be-47c3-a00c-51523a5edc01} 720 "\\.\pipe\gecko-crash-server-pipe.720" tab6⤵PID:5612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5676 -childID 5 -isForBrowser -prefsHandle 5596 -prefMapHandle 5600 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {faf90b2f-f530-4ffd-97fb-fc747503a39c} 720 "\\.\pipe\gecko-crash-server-pipe.720" tab6⤵PID:5640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6148 -childID 6 -isForBrowser -prefsHandle 6028 -prefMapHandle 6104 -prefsLen 27182 -prefMapSize 244658 -jsInitHandle 1296 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {250b4af8-472f-4a59-ba78-bf6787654f10} 720 "\\.\pipe\gecko-crash-server-pipe.720" tab6⤵PID:5484
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5320
-
C:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exeC:\Users\Admin\AppData\Local\Temp\0e8d0864aa\svoutse.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4120
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
187KB
MD5278ee1426274818874556aa18fd02e3a
SHA1185a2761330024dec52134df2c8388c461451acb
SHA25637257ddb1a6f309a6e9d147b5fc2551a9cae3a0e52b191b18d9465bfcb5c18eb
SHA51207ec6759af5b9a00d8371b9fd9b723012dd0a1614cfcc7cd51975a004f69ffb90083735e9a871a2aa0e8d28799beac53a4748f55f4dd1e7495bc7388ebf4d6a0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\zrrtvxky.default-release\cache2\entries\E449899591A9BC91DFBA673EC0589B51E541A88B
Filesize13KB
MD5b50f9659158ddaaa3a09ae905e29e01a
SHA195fc962319fbd5cd178c0ab0842d6c83f877225e
SHA256b7d8b6ada60ebb12d23bc4690ead766fb93d5976e77509c79e3ee40adfcddba4
SHA51276ecfc814b11e613e4384407ab89320ad7c5b1154dbd26eaf9293c90cf3a6bbcbebf0e972381f042878be6e6c524090499ba6fd57dac5cd9d6de7ed13866f1df
-
Filesize
1.8MB
MD5e2907853e63eadebb2c9bddd216a7685
SHA1e96e683b71f13711ff8fb15a1e4a1ca6cc5fa1eb
SHA256fe7f26d404534c2430a40e7937488603a58e34e4375ed58013bd9ce776f14ad7
SHA5121ce2cb97967437c8f2c2e2d97b82c11867679f320733a2f924bc2ff985d73a7c5d7c4792abd9058d63a843e3b4f48520801c6864f708447ddbf3e238d127cbcd
-
Filesize
1.7MB
MD5758560621911e97b8146a9f9fdbf027f
SHA1a17804bc0bbf374cf59ebf83f976b7f24cf4cd2a
SHA2560c5e08f2b9575ddc5328900ea63bb4fd5b5d1d01e808913bab99b87d50fe60dc
SHA51233590b78c8aa364d0e76fd62af12eb68842d54ac29fae4c2ee6bacb12d208d33a456d45562720024f5984fc1d46af51ec07a466cf750e0c1720ff37efed31276
-
Filesize
2.4MB
MD59f65e512d754f74a46bcf91ee3bb5ffa
SHA1c5a8b3c76fcd53765b6654bbd2d5d6f89dd1b168
SHA2564008907df2c6ce211451f5c7142e15dc727cf5961c0ebdecb52e07debcf5df0d
SHA512489489553cb666a0445e8605d7db5a9bd8ed6f9d1f3d58f48849de3a7be38fd3f735e7a916c381acfb24fec56e46540381fd75cb7d1f1ee965d04826789c0db8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\AlternateServices.bin
Filesize10KB
MD5adb8ddcf7e2a3079120d7275e86ddfaa
SHA1a7a63f468f200789435046f646a17f4108922d18
SHA2560d72b3afee4b0cdd9c84e7c0d649559b8b7c09bbac08e8d315bef04478edbca0
SHA512fed69bd42fa49f91cb0b92a3103e3691b261b742bb1d44493a9911f6b12026de863985941be6f379a3e7595575e9dfe0a158d91c7711da27444ca47068ec2605
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD58fc3227f043e568b58e370a7415188a9
SHA14290c45fa72b1f9a92e59d5b3acd7587e0f4e117
SHA256cda1cfb14c05e9f5a3951fa0603f32b8831e2a0a8d144d27d3c548a658fa08d8
SHA5129055634126ce092b1aca3317a24a83ecfd60ef09e397064d7a62abc1415b7901e11c2479dca0b3cc53ac498fc9e245bd9e74233c68bc7054bfdad226b552894c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5cedcc03aa4fe5a9e2833b8838692601b
SHA1ec0b235186aa0ba901d927853820d60999de1262
SHA256d281569c3c31f094ea320e680dc90a5e441cd00b9cb872857d02b8ffccc92f41
SHA512a931aef2d2ec79748d21d78791f9c3c978e895a1690a24caaf319c12fa28565a1e1282b49e782ae93cd9ba988d8fde1dd6d6f5467afa13ac971f9e348edaec71
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\00443b16-fa1f-4536-9a6d-547c77cec4ca
Filesize671B
MD58ba049796bcbff145997eebcf6847364
SHA117dd88abe309eb048586b8a2c4df4a8181cbe94f
SHA256580adcad7e2bbe3c5527e0bd44befaac04d2c48e36d98d7bb87fe07881182020
SHA5125bf53633d80beff2933a9d053fe80b049283a742237a67156a7ca1dfa96ee8123c9f4bd83fe8c8508508fa57460e04487210e0e22ea27081b9eb33f3cb8fdfa9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\4d3d3bd7-4c08-43ed-9f52-de1d7ee4cb7a
Filesize27KB
MD59cdb965643dafd984a80c7d3d0ccb261
SHA175ac533cd10edd0a0ab5cdef9e98ceb8d3c08553
SHA256d662f5b3fddd4c8282fb6ecd82d1603fd327251d2f84fdc53b0f039221d060cc
SHA512be52be27acd1fe7f32ab294feea1d9a09525426f0e28abacef7707d270ebce005e9b8bfdf1ec35b87ad73f6ef7aa0ba554a28c5f2ac2431187eb2b01c7954ef4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\datareporting\glean\pending_pings\4f916e5d-0523-4ca1-a3e6-22a86ef79353
Filesize982B
MD5b42cffc8b0a7b85c1fc58faf88a38ce5
SHA11873ffd0f4eae0ab22ac325736dfda159a45edfc
SHA256fdaed785a7718bb8d8b8531860b2b59352ed26a0605f9d6b7765f534f31c1c59
SHA512eba37b902e31743da7309620683463a044dcd40b3a5893ff686c965d37e1435e05cfe09d6f46e5dadb3834863f94d0f38f44465d840a37c43a1a64562c459c1f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5dce599f27b94df79150b486c3425fbb4
SHA1347457e8778a5b9ce5f22c1a9a8aa4c6811dcb9f
SHA25694a61cb28c4aa6c082183cdcb4e44ba22752e101457fd18e69a82959ccd12b70
SHA512e6e0ce5357daea1bf0ccbe880494eca1be8fb8ebf29d80d63b0a18a5c36f9a15b4433d9e1d46f48b9d741c602eec4f81f4c6fe84381c8a3a6a8ab4d08934dcc0
-
Filesize
15KB
MD5f2fdcf22d309862e2b7fc7d6131dd363
SHA1c9dbf02149f85c69f76fbae1cb019fca133f8185
SHA2560cc674d49a6026f9bab984c5ce0b915174629b3acab57bacb4971b45983c053e
SHA51213dd082cb222edb35af0faf02273f6b725108ea8783389ce21d492d284a182a09dc21d8222c9b1949a84b383de2e6bd499257b8bc896a47e17cbe5314b993216
-
Filesize
11KB
MD5022aa22afbc5e7438f2ba57d1da8a501
SHA133c4b6a266ecec6dd7d7e84a831919c6e905c474
SHA256790c3a8f7ed43873f6b81e175d9d9464375e55781f819059c385efec4a6a97a6
SHA5127773c7331355785e91ac710223415006ae5e61f78fa7b15c8868eb304338848343ab53d5ff6a1ea248eda1a6c023fb9f2b77869f24c51a339b338cec20b083b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\sessionstore-backups\recovery.baklz4
Filesize5KB
MD5a65a46f34a83e01881c76bcaf5ba26f8
SHA1aa696ad0ea56eb11757284e8bcfb47ac5ee2473f
SHA2562b91832e608b4e42b2aa4cb0a6de33482b9402086123a34a89d0ec6e4ffe9145
SHA5124dd7fd84cdf05d14be9bc23fa681ddbf005c09655df7950833160081c26ea5c2847b01f4fa3f5cc421a44c6eaeeb157600b9a063c6a8615a9922cba4f884e421
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD5396d24574ca38789f56bf0248dbe989b
SHA17dbeb4dbcf644d2a890b26222314c7954ee30b32
SHA25642e64cb16670e5f3388dfe9a4c90c1784ae2185af601ab4b4775ebc3f86bed4e
SHA512f9ab20090d91808c5cca46f031dc8bb3d2c3bbef80d95b876177ca002f5e7eb9b27a478868dbfe811403a5a9a9be1d59fd4df728444632664a3a4c18db22111f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\zrrtvxky.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.8MB
MD525b902d092b56bdb1d622809bc262fba
SHA11058f387e2bc400841580e0ac4112c6553af2fa7
SHA2562ba40bb056094b536cb122438b31bd225d0b72ff410c3e92372c4a109458d168
SHA5124378c25b7dfa2e67c6de8c797f1effda6930934514683c6f2302e838ea4b1153a31bae182fa28a78a27b4d044f5f919c8218d1296d38dc211aceeb2f60030db8