Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 23:33
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe
Resource
win7-20241010-en
General
-
Target
SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe
-
Size
3.1MB
-
MD5
ed2775c75cf9a06d2084e52913c62203
-
SHA1
c6f79f4cbdd1d6649ad124d5439142609400ae91
-
SHA256
0fed91254f03a3bff84798b10a7adf64b664d35c3e1fe0cc66ffe57908210870
-
SHA512
9d1787c1a4482a04cb994f84c203ad03b2efc1e7c6c10294fe16af636748d43d3a2381ce5aaf999dbf8569ee1d518eb29b63c333428615c8b68f03b0497fccda
-
SSDEEP
24576:8Ua+YqELCacqH6OTGf89YgxIxGo1/vsG4TgIJrM9Mn71k8wmIOjwgobH4LJ6AxDG:hE7DFGfgux7dQJ4YFJt0f07UaxcSnnF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f9e90f8dc3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f9e90f8dc3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f9e90f8dc3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f9e90f8dc3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f9e90f8dc3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f9e90f8dc3.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4460302fe3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a3e84a2ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f9e90f8dc3.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4460302fe3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4460302fe3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f9e90f8dc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f9e90f8dc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a3e84a2ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a3e84a2ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 6 IoCs
pid Process 1972 skotes.exe 2072 skotes.exe 872 4460302fe3.exe 216 2a3e84a2ec.exe 3504 46af0964cf.exe 5460 f9e90f8dc3.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4460302fe3.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2a3e84a2ec.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine f9e90f8dc3.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f9e90f8dc3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f9e90f8dc3.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f9e90f8dc3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003511001\\f9e90f8dc3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4460302fe3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003508001\\4460302fe3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2a3e84a2ec.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003509001\\2a3e84a2ec.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\46af0964cf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003510001\\46af0964cf.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000e000000023bd3-70.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 1972 skotes.exe 2072 skotes.exe 872 4460302fe3.exe 216 2a3e84a2ec.exe 5460 f9e90f8dc3.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46af0964cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4460302fe3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a3e84a2ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f9e90f8dc3.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4828 taskkill.exe 3472 taskkill.exe 4796 taskkill.exe 3456 taskkill.exe 1368 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 1972 skotes.exe 1972 skotes.exe 2072 skotes.exe 2072 skotes.exe 872 4460302fe3.exe 872 4460302fe3.exe 216 2a3e84a2ec.exe 216 2a3e84a2ec.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 5460 f9e90f8dc3.exe 5460 f9e90f8dc3.exe 5460 f9e90f8dc3.exe 5460 f9e90f8dc3.exe 5460 f9e90f8dc3.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4828 taskkill.exe Token: SeDebugPrivilege 3472 taskkill.exe Token: SeDebugPrivilege 4796 taskkill.exe Token: SeDebugPrivilege 3456 taskkill.exe Token: SeDebugPrivilege 1368 taskkill.exe Token: SeDebugPrivilege 2936 firefox.exe Token: SeDebugPrivilege 2936 firefox.exe Token: SeDebugPrivilege 5460 f9e90f8dc3.exe Token: SeDebugPrivilege 2936 firefox.exe Token: SeDebugPrivilege 2936 firefox.exe Token: SeDebugPrivilege 2936 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 2936 firefox.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe 3504 46af0964cf.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2936 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4112 wrote to memory of 2072 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 87 PID 4112 wrote to memory of 2072 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 87 PID 4112 wrote to memory of 2072 4112 SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe 87 PID 1972 wrote to memory of 872 1972 skotes.exe 93 PID 1972 wrote to memory of 872 1972 skotes.exe 93 PID 1972 wrote to memory of 872 1972 skotes.exe 93 PID 1972 wrote to memory of 216 1972 skotes.exe 101 PID 1972 wrote to memory of 216 1972 skotes.exe 101 PID 1972 wrote to memory of 216 1972 skotes.exe 101 PID 1972 wrote to memory of 3504 1972 skotes.exe 102 PID 1972 wrote to memory of 3504 1972 skotes.exe 102 PID 1972 wrote to memory of 3504 1972 skotes.exe 102 PID 3504 wrote to memory of 4828 3504 46af0964cf.exe 103 PID 3504 wrote to memory of 4828 3504 46af0964cf.exe 103 PID 3504 wrote to memory of 4828 3504 46af0964cf.exe 103 PID 3504 wrote to memory of 3472 3504 46af0964cf.exe 105 PID 3504 wrote to memory of 3472 3504 46af0964cf.exe 105 PID 3504 wrote to memory of 3472 3504 46af0964cf.exe 105 PID 3504 wrote to memory of 4796 3504 46af0964cf.exe 107 PID 3504 wrote to memory of 4796 3504 46af0964cf.exe 107 PID 3504 wrote to memory of 4796 3504 46af0964cf.exe 107 PID 3504 wrote to memory of 3456 3504 46af0964cf.exe 109 PID 3504 wrote to memory of 3456 3504 46af0964cf.exe 109 PID 3504 wrote to memory of 3456 3504 46af0964cf.exe 109 PID 3504 wrote to memory of 1368 3504 46af0964cf.exe 111 PID 3504 wrote to memory of 1368 3504 46af0964cf.exe 111 PID 3504 wrote to memory of 1368 3504 46af0964cf.exe 111 PID 3504 wrote to memory of 4976 3504 46af0964cf.exe 113 PID 3504 wrote to memory of 4976 3504 46af0964cf.exe 113 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 4976 wrote to memory of 2936 4976 firefox.exe 114 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 PID 2936 wrote to memory of 232 2936 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Evo-gen.27278.21477.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\1003508001\4460302fe3.exe"C:\Users\Admin\AppData\Local\Temp\1003508001\4460302fe3.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\1003509001\2a3e84a2ec.exe"C:\Users\Admin\AppData\Local\Temp\1003509001\2a3e84a2ec.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:216
-
-
C:\Users\Admin\AppData\Local\Temp\1003510001\46af0964cf.exe"C:\Users\Admin\AppData\Local\Temp\1003510001\46af0964cf.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0d5c63a-e605-410b-8d65-d60b24427b43} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" gpu5⤵PID:232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {679022ac-c353-4401-84d9-4b1d49407c5b} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" socket5⤵PID:4372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3188 -childID 1 -isForBrowser -prefsHandle 3200 -prefMapHandle 1708 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a43637d9-12a2-402e-b0ac-1df5ab36207e} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab5⤵PID:4584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3900 -prefMapHandle 3896 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75f54819-33aa-479d-9697-f35ecd7affd7} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab5⤵PID:2104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4652 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4832 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a2b2bb2-656e-41d8-b4be-095b9bd08a14} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" utility5⤵
- Checks processor information in registry
PID:5512
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 3 -isForBrowser -prefsHandle 5348 -prefMapHandle 5332 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a29e8c4c-4f66-4635-a34b-a5f66fe97388} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab5⤵PID:3284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 4 -isForBrowser -prefsHandle 5556 -prefMapHandle 5532 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {150e678f-4ebc-4a08-b2ef-b4e84d0da98b} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab5⤵PID:420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5784 -childID 5 -isForBrowser -prefsHandle 5708 -prefMapHandle 5712 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb4049ee-c369-4d5a-bd65-1d17fd4a549c} 2936 "\\.\pipe\gecko-crash-server-pipe.2936" tab5⤵PID:1572
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003511001\f9e90f8dc3.exe"C:\Users\Admin\AppData\Local\Temp\1003511001\f9e90f8dc3.exe"2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5460
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5238f078ebbde814a5538ac01dd5c45a1
SHA167a9363a2b3a72a6e36014a5700f64482c8141f7
SHA256884b26be808911ec686b5b149a21cea99e0aea754b1cf58aaf3b4ea133f85660
SHA5120ae1b3dc27f4d4cdfe90cc3f531a148d8a5b9f7f6b06a59f421be6e332fc5e819fe661494384d7ba5d5700c7d29849315cbb142374c6fcc5f74831accc4d4a02
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD54bebc7db5e0400d4994d5e358ede4d52
SHA1471820e9a3438e4efe1dccff86f440636e419d16
SHA2565470c3601abb3fb45ed809350a16fcc858a61f8cc0710bc65787a1b79fb94d4b
SHA51275fea97dcbf284be1a0e37c68829ff4e75bd0130a44f45b8c3eedf3a449fd2461a79a4319f3fff79dd0733fa83502e33f25a4d23351b8bcbcdcad08a2c80c087
-
Filesize
2.8MB
MD5250473f7cf820ae98790d9562e521869
SHA1a75a5b09057517cd403ae6eead19e76ba57d986b
SHA25609c99315f3c5cf598a4a9a2db049e17d32d3c8ebb6af4398786a75d50ff17527
SHA512e881441474661e9af14f29e96046ba52d2a1d19f82c57f54bc4df9489c1a32da4d176e5a203ea427a034900db59e8d6b3bf1b8536d7174cbe80a9862ba6eaca0
-
Filesize
2.1MB
MD5e8c67e166d7639998d5900ffff8ebb67
SHA10314b649fdaccc8ebdd31fb276e294ff2cad5970
SHA256bf16a4877794d068812cb2dd32756c731b5491d54b1eb3ee6da321f93ab69f4b
SHA5125933b04f7a77e88cbe4dec22938ddf59983e263d598e7a6653d1297d51373f4071580a7fa789e814115dbfebe8f24cab35992d8112da917af0a519fec78f0abc
-
Filesize
898KB
MD56c9002d8dcf44d51a7f5c571579c5e40
SHA1e6795239be3c06c64723c2804b5b21a04a2fbe01
SHA256b48f43125a30149767095d1da821fe4e02207d04b4a34dc7c5aa59080dc9cd50
SHA51230f0344f7f761ec0e30d9807f71feb92f645967fccaad26bfae2ad4ce3358ded944da46a4a950d6a5aaacab8f37d4b5440c4af4b8d96f95535c40a57730321c6
-
Filesize
2.7MB
MD51993faa9adbc91e62bf152e3f9c6f29a
SHA12c95ab31fff9d414d9ef45126cc89530b44dd22a
SHA256e5179cbb88ef53bbea998655b3aed68dd085c8a15fb514cf62a357761357c8f0
SHA512c6055a8f74616cebdd177151c1473715544a71c33e50495dc4a1e11d68e252f49d966932ec6d52672c3c5f17fe3f0d1aeec9d33b9a75d6e87404fbdbceb85d01
-
Filesize
3.1MB
MD5ed2775c75cf9a06d2084e52913c62203
SHA1c6f79f4cbdd1d6649ad124d5439142609400ae91
SHA2560fed91254f03a3bff84798b10a7adf64b664d35c3e1fe0cc66ffe57908210870
SHA5129d1787c1a4482a04cb994f84c203ad03b2efc1e7c6c10294fe16af636748d43d3a2381ce5aaf999dbf8569ee1d518eb29b63c333428615c8b68f03b0497fccda
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD5b6ebf7d36932d2727930a76d953cd872
SHA14ad107eb8dfc93c3c43fdf748e49c818a58062eb
SHA2562112df31a2300e8a2ce544a672932670ded9f66c982d33210fd5c33428a751a8
SHA51206ddd1fa6e59e89600e53522b3f3a74abdfc9b34609b8c8ad6c2b2317bc72348fc03194c2c010354e3be7b7eb38e556b1668bb36581319c19460b0f872f52a5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5d5f52eb0c7904df4aa0fa06dca927ecf
SHA1def4a81a5439680c609ada288ebae89a8eaa5620
SHA256fa98af5653793ce43ca7e9f93c1cb89fdbf777a62fca03329bd77f72a27c7cad
SHA512076bad438ecf9241764e885c71d8b9bdd3fd57397f239272f667a4e5a3358fd487827356111bdb332f64f203b838a507ae5364707cfa5cb806d84bac38258726
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5e8f76c67d9f6510b267bd48384b84eed
SHA14f141e351ae716e40ace578dd250d4ba092dad05
SHA2563a3db25d99b56eed0fab25e6c0263e52dbe6e8016901e9862f47851f546baffc
SHA512655cd82f9c840193da6b6d034e0533bf4b1d44b57ce826339130501fb3ef444d45fcef958507d295a4c7afc138d75bf41ef5387ff6b3830b11129b285b34a3aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD59a30dab6fbf6696c0ca26f58d3a63e4f
SHA1b45e2d2d5890eec1b6fec17523f215908ee4b35b
SHA25631254f8ae3575ae0b53e9c28539543d03fa92c3536a7f6b79463ea8315611828
SHA51268984db5c9c0c7a944de5e874fc876dac4a0a04a4dade605ea332fda4eea3c7f2f61f14740dd278f3e1e7c6e98d682cfca46140e0b1c841e7b08adc4319897cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c363ce9f823e7f4a9b4eafcc71db13b8
SHA13cbbc3e5a5c96923fdc433e6b34cdabae9e94cb7
SHA256911f0abe95aabd7433f38fcec0c6fd3b30c32d4a321e940d8ffc6d54b48f75d3
SHA512841d8be2959ca86dd58303631a279bf082706a939dc0abe36f323beae95212aa577c99c9efabd9fc24223b78aaaf124bce345e2175e2d473a62f78815980e8ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\04cef49d-39ed-441a-8c41-e2158d173b54
Filesize982B
MD5eeff5373cccf8d850790e97172fe622b
SHA10ea47ac74e35982d5a416aecd5d52c48d3d40777
SHA2561a329eb2a3193b74fdaec5bcce913bdfb4bec41cb8bd907fe9dba09b2c53d70f
SHA5126456fcaf58819eab6ff164614a859d963f48896651c631d68bd5a4235b325c9abc71cbcd7a84ce9c35c38bc0f644b6b3b6f9fab86fb91f6dce4c3ea53473b566
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\1555b3f1-a304-4ac8-86d9-a2f2799b3679
Filesize24KB
MD5fe1a81c224d65c6dede560efa23fd4a4
SHA15072b10b79b630cbf2576579ec93c13bce19a26b
SHA2568d09f519c1ca3fb70f2cd8cc381b2a1d1116773ada3613449091ff57287803a7
SHA512c61a953cfdbf210f97f1b7597d048016848436d6b09313b7a5ade7b5ef02b8d1452687eca1f6d7f23bb8813311c22f905fed3a201cfcd084feb1ad57b49aa0ec
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\b2dddcac-f28f-40d8-b440-28039699265b
Filesize671B
MD515161fef9db3c7b0e5faf16362012479
SHA131fc47826907759f24680a04fcfbb4d1c3027720
SHA25669fd19eb82c3711e92fd5dbf992ff69bfadf4aeb03a20f86640d96e4ddc6272a
SHA5123a479bd9ddf7f20f7f283559465d581be7c97b8ebbb332f765dfbc8a5be470a0b8b2d837bf7dc00f1b06fef2723bf36219b230408205bd5d5d88991e49ca9df5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD5619b06bea287ff9d4bd5fd694ebe9f7d
SHA188870af92b1a7810281e262279d3b4178a7a6f4d
SHA256bdec41c1a1b7937cb9d0686b4999706ffac1abd9d2ff20649a163796fb57ce9a
SHA5124f44969eeba1483bd89a0f137c8ea0735dc1ae1f678edf0a4ccb6a5cb65fd8dab47408903cc38d5cc370df1187cdf5b93659081c4cae80bc20241a6abbd4cf48
-
Filesize
11KB
MD5375624bb65a157b8ecde81c78000b48a
SHA127f9537c8b09c14bb53ce43aafd326646a1ab4c9
SHA256522515e37adbd492c20142f39828f1d326d637f97698cd052aaa4dc8453f5c85
SHA512e00efea6c6daa7dc3a7f069199428290d493f21fe794691636757c4c177ddebb1f0876a2bbe2f4c520a4fecaa9ed46e914dc3d43bdbd77b2e29f1a0bdf856b94
-
Filesize
10KB
MD5c83b048120380940a5e263beb64932e3
SHA19ef30a7024eb8f74742c3d1bf395ca8e4129c584
SHA256c0f8c5cb1595321fc91bd769131dca3ee2f95906dbc2007ce20dc006ed87fafc
SHA51275eeb74a5df374bfdb8f71e38f4a2a2169bf22608236470146c1721d41bef48e46e769b891a1a9b9c9c8f50512ad60245e6348a5611286f82540fbea3476c9bc
-
Filesize
12KB
MD556f82eb5c24d77af697dd036584e7730
SHA1e4228b62f41533fff88b16a6c97aa5014b452baf
SHA256e043a5f073e1cf968eb42f2f8dcf118b7975d735b19f8f74557b98a29f111526
SHA5128c46e2d4b9322df427321cbb1d39ba0ff190b689896c5d94642b48899745a07ebd117834995cd18e167b179aac7baba3a78827ed8a8b87811eb0e405e9fdaa0f