Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 17:17
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.9MB
-
MD5
80412b3957bd97e963d415a8618f04dd
-
SHA1
824702ac5e71cc26540fd822fcb293c480967be5
-
SHA256
d470c37e2ec5e94610b152fcba101178d488a280200233dca2704f04377cd62c
-
SHA512
f8e7c5f3bfa8bdc66e448824458da97d32341f6c25118906968acc9bc1de35ec3daa520d76d25abe23be520ecb4d466820781da2c3ee686ed156a1e5332a5c64
-
SSDEEP
49152:TO7lj/QAvv6Vt2IeSLB8FFOTTAOto+ROyyMYWSeKi5ugTOFK9dW1:TO79oaxeLBeLT+RTyMYWSziIFCdW
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 486ae9c05e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 486ae9c05e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 486ae9c05e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 486ae9c05e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 486ae9c05e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 486ae9c05e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c0f1deff62.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0903791879.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 486ae9c05e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0903791879.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 486ae9c05e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 486ae9c05e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c0f1deff62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c0f1deff62.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0903791879.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 8 IoCs
pid Process 2004 skotes.exe 1924 c0f1deff62.exe 404 0903791879.exe 4856 782d1c2de8.exe 4984 486ae9c05e.exe 3168 skotes.exe 5252 skotes.exe 4380 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine c0f1deff62.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 0903791879.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 486ae9c05e.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 486ae9c05e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 486ae9c05e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0903791879.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003448001\\0903791879.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\782d1c2de8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003449001\\782d1c2de8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\486ae9c05e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003450001\\486ae9c05e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c0f1deff62.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003447001\\c0f1deff62.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cb8-67.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1120 file.exe 2004 skotes.exe 1924 c0f1deff62.exe 404 0903791879.exe 4984 486ae9c05e.exe 3168 skotes.exe 5252 skotes.exe 4380 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 486ae9c05e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0903791879.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c0f1deff62.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 782d1c2de8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1772 taskkill.exe 3080 taskkill.exe 2224 taskkill.exe 3680 taskkill.exe 1120 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1120 file.exe 1120 file.exe 2004 skotes.exe 2004 skotes.exe 1924 c0f1deff62.exe 1924 c0f1deff62.exe 404 0903791879.exe 404 0903791879.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4984 486ae9c05e.exe 4984 486ae9c05e.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 3168 skotes.exe 3168 skotes.exe 4984 486ae9c05e.exe 4984 486ae9c05e.exe 4984 486ae9c05e.exe 5252 skotes.exe 5252 skotes.exe 4380 skotes.exe 4380 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1120 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 1080 firefox.exe Token: SeDebugPrivilege 1080 firefox.exe Token: SeDebugPrivilege 4984 486ae9c05e.exe Token: SeDebugPrivilege 1080 firefox.exe Token: SeDebugPrivilege 1080 firefox.exe Token: SeDebugPrivilege 1080 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1120 file.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 1080 firefox.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe 4856 782d1c2de8.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1080 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1120 wrote to memory of 2004 1120 file.exe 85 PID 1120 wrote to memory of 2004 1120 file.exe 85 PID 1120 wrote to memory of 2004 1120 file.exe 85 PID 2004 wrote to memory of 1924 2004 skotes.exe 95 PID 2004 wrote to memory of 1924 2004 skotes.exe 95 PID 2004 wrote to memory of 1924 2004 skotes.exe 95 PID 2004 wrote to memory of 404 2004 skotes.exe 101 PID 2004 wrote to memory of 404 2004 skotes.exe 101 PID 2004 wrote to memory of 404 2004 skotes.exe 101 PID 2004 wrote to memory of 4856 2004 skotes.exe 102 PID 2004 wrote to memory of 4856 2004 skotes.exe 102 PID 2004 wrote to memory of 4856 2004 skotes.exe 102 PID 4856 wrote to memory of 1120 4856 782d1c2de8.exe 103 PID 4856 wrote to memory of 1120 4856 782d1c2de8.exe 103 PID 4856 wrote to memory of 1120 4856 782d1c2de8.exe 103 PID 4856 wrote to memory of 1772 4856 782d1c2de8.exe 105 PID 4856 wrote to memory of 1772 4856 782d1c2de8.exe 105 PID 4856 wrote to memory of 1772 4856 782d1c2de8.exe 105 PID 4856 wrote to memory of 3080 4856 782d1c2de8.exe 107 PID 4856 wrote to memory of 3080 4856 782d1c2de8.exe 107 PID 4856 wrote to memory of 3080 4856 782d1c2de8.exe 107 PID 4856 wrote to memory of 2224 4856 782d1c2de8.exe 109 PID 4856 wrote to memory of 2224 4856 782d1c2de8.exe 109 PID 4856 wrote to memory of 2224 4856 782d1c2de8.exe 109 PID 4856 wrote to memory of 3680 4856 782d1c2de8.exe 111 PID 4856 wrote to memory of 3680 4856 782d1c2de8.exe 111 PID 4856 wrote to memory of 3680 4856 782d1c2de8.exe 111 PID 4856 wrote to memory of 5020 4856 782d1c2de8.exe 113 PID 4856 wrote to memory of 5020 4856 782d1c2de8.exe 113 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 5020 wrote to memory of 1080 5020 firefox.exe 114 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 PID 1080 wrote to memory of 3588 1080 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\1003447001\c0f1deff62.exe"C:\Users\Admin\AppData\Local\Temp\1003447001\c0f1deff62.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\1003448001\0903791879.exe"C:\Users\Admin\AppData\Local\Temp\1003448001\0903791879.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:404
-
-
C:\Users\Admin\AppData\Local\Temp\1003449001\782d1c2de8.exe"C:\Users\Admin\AppData\Local\Temp\1003449001\782d1c2de8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {937d0b4b-3566-4398-a6a0-cf66c1a56e8d} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" gpu6⤵PID:3588
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82879561-219a-49d4-911b-cc3c388cd288} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" socket6⤵PID:2504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3320 -childID 1 -isForBrowser -prefsHandle 3312 -prefMapHandle 3308 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 956 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae394582-421b-4abe-9ca6-12611ac0821a} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" tab6⤵PID:4416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3688 -childID 2 -isForBrowser -prefsHandle 3680 -prefMapHandle 3056 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 956 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b390f329-2f94-4581-87d9-ddfd4c7ab882} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" tab6⤵PID:4980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1576 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4692 -prefMapHandle 4680 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8195eefd-bbd3-4aec-a7f0-232dfa87b05e} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" utility6⤵
- Checks processor information in registry
PID:5504
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5440 -prefMapHandle 4632 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 956 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e0399e5-508b-42eb-97c0-35b2f73196eb} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" tab6⤵PID:4792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5708 -childID 4 -isForBrowser -prefsHandle 5624 -prefMapHandle 5524 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 956 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b6841845-b735-4b40-9f78-a3c36a8ab717} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" tab6⤵PID:3440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5844 -childID 5 -isForBrowser -prefsHandle 5924 -prefMapHandle 5920 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 956 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e38ab1de-cbc0-457d-88b3-c18a18f0569b} 1080 "\\.\pipe\gecko-crash-server-pipe.1080" tab6⤵PID:1280
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003450001\486ae9c05e.exe"C:\Users\Admin\AppData\Local\Temp\1003450001\486ae9c05e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5252
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4380
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5a9a34c585e1fcea963cbbff326dc4313
SHA1bade99880be3c87b6a35b0850970a3a8d097eb65
SHA256110da6768f23762f798800bdee0111b33dc5afd5de215e340cb6fbc3fa68d809
SHA51249c0fca056b5abcff83ec0dc39e91b829e7070a5ca845088dc2603c0a0dab9624dc27a80c681ae98f4cbc2cdebbfb7d679fb7864cccd46948d6e67a6912b09e3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD59c28e544b10275f0be0e7f7b423cb62b
SHA131950c6c45e9f472111a249faa7ee3706153be11
SHA256302776966e1c052fb0a5424c9ad952cfe7b7d046f1b3adec0c997da478a493bf
SHA512e56726bc6ec1cb1a8ea18738d879e4454ee0137470508ff7650830804e8e6a6136621bd51897bb4be3579eaf95fdca221b786493482962cf186c0d1f066152c2
-
Filesize
2.8MB
MD517858fc3613b8b59a50df4b767d1c025
SHA15024595b41462047be1ad673445eb3a65885ac18
SHA25643d6fdf01afdc2058403481f4b9a9008c9d5b7da4e3995deaa2a06031b983da7
SHA512d094df2e659cb635bb2bae3c9965b496a5adfe8b058f7effd9289c81021dc6e697271de20da9bdb48c1e8055f6d96dc2b10c9883a7740444bbf3a4814e90a090
-
Filesize
2.0MB
MD5aed37464a2128c89076188d9f416401a
SHA11b954f16ca55bbf51b2f45c6fb71d349de6842f1
SHA256962d675cfea4802ded2e4a1f4b70044ff15988cb73e740037298d4b2b1891631
SHA51278bdc21975e2d0c64e0b8af8e6f18d45ce1da4c9fb1567ba5304d426ff30ee71f2b0b772d16c8415e4260c8af2fb7b92d82ab89fcc67b3d0428fdc0b1ef21b5c
-
Filesize
898KB
MD589e2147494ce55f00e64e46a419cbd1a
SHA1c4fdbb426556d6129bd67238a2864c9c626511b5
SHA256eaa21e18e2215318c605ecfb7cb717742b45875430da33c2d687442a0479583a
SHA512cf4ed97fbef0b8e94919000ce67405c9f09b8df79e4fd2c515ea7daa071de928a79e759ef6d55c9b749809c13cdae7f0001ad561c257c0b2874c53726737fe3e
-
Filesize
2.6MB
MD56673fa24dab970e82578fa5ee4d78f92
SHA14cf4945fcd085bd247a45932e29dbab3dad11191
SHA256d84a723ecb954e94eb3bf05723580622be164b092183f5b735b2506e4a27d629
SHA5123a21460b88a889bf1365bbf571adbac867d6ac723a29ba91c51435d0b1a1cf046a39f011c4db4af14fe2027711e64ff0c8162ccb9fcbeb053a880250129e747c
-
Filesize
1.9MB
MD580412b3957bd97e963d415a8618f04dd
SHA1824702ac5e71cc26540fd822fcb293c480967be5
SHA256d470c37e2ec5e94610b152fcba101178d488a280200233dca2704f04377cd62c
SHA512f8e7c5f3bfa8bdc66e448824458da97d32341f6c25118906968acc9bc1de35ec3daa520d76d25abe23be520ecb4d466820781da2c3ee686ed156a1e5332a5c64
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize7KB
MD51a9bd871896db76d2da22dea6c541023
SHA18292977499a27bf327876af9bbb10e677a74f163
SHA2561a73f9558b5e0d8113e4f1fdc0596b79663fdb328745177f0fc1c5b8b3222067
SHA512512cb3651032b75a977996ebc4e2e6082b35b4ebbc7ef1eb8c551568b20baf72d08625ac3ecde6e6b977cf752ce512cf318ad9c1bdb9bc2d8324ac46dc42ae5a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56f12586e437d9f21f6356ccc7c9aa4de
SHA1ab05a9dd448d02ac05983d283bf1ce148076d747
SHA256cdf4e8d96162c47d5ccf48308291f224de17f33469cff51f024436004edda8d2
SHA5127b33d8729bd5c00b67ea7d577be42c8949d10dadf9982ef2cb8dfe544f53ab67509e222cd83fdaaceede04ec7027f6a39203dbddc8b3d4123533da8f67655655
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5571be8408b863a15e6458500afd0f084
SHA15ecd8e99a26780b33c50c8e3d5bb80d7a6d8f20e
SHA2562baed2576fb51c145ea9bf9025dbc4f7680c4bc1bcc3e0967135fee0d745cd93
SHA512325bf2c6de78523d5a7fed75cb9163ba9bd7e9ad047ed38ad711714c73e273e83ced057c0d34d21dd57b6eb428db361b344cdeb5bff7841744c534450031a174
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51a6411e89cef2d4f0cdb8c555a738774
SHA122753fec04f5826563fd3593fcc05c9efddcad6f
SHA2569fe6c6ce03d2eb86216712c0329c5dc4d3e6b103e22b7218a913bd56fe9609d4
SHA512700fa94db30e077eb74b60cbbd5f06d52c75249ee178a06d0288c773a6e816a4a4b6d99198413f9fcf9d15f6ae82f44c20617616511849ec5eb098248925132b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5618c324cd7005bc677ec08e89b14768e
SHA11a13af25efd0eb3979c92c3ae097546700005ba9
SHA256bf817234bf756914abb393a90eba5cfac111a86ca3f7d633bf83b81130b23950
SHA5124fa860141ffd69dfaeb5bbb817182a4ab8b44132f7c11d5cbe92fdd85243bf6b927ac87874829616766dea22969fcffb9252596d024e958114940ba81c1a9467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\3947eada-2ffd-437a-9cc3-2f9000cc62ef
Filesize671B
MD530b12e910d6857ab32f25d78f39ece04
SHA11df24bd0e27a6ddcd8bdac9e9171d480bdd7158d
SHA2564361ce512d9cc35314d694cc099506198764228e556a3fce2751592fd2af0b54
SHA5122faf9781e5eef5a12ac30d70f7916b1d33875c6862e27b908c57b97fba2771d83881468f3491fdca6541459925cdccfb0731fc5a910bb42d52f24085353a6a27
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\64234e2f-8049-45ab-9b38-4e45539c9520
Filesize982B
MD5494e6ce154f49bc9d7ae16ec1b19985c
SHA10c3c102e846bfa5cc672fd48cdce4dd9f9aa972f
SHA256790689bfd977e182c179d8d19b328a7ae6e56be02a45ec7beb9474bd0669bc21
SHA512bd2cb3384b68cd3a6eab6cf5d6cfbe616b6242780ec1ac9d7053c28ae3160f9705e280ed98ef493ea83659aff560470147456dd8b17f50e22b08e2b9dd0453ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\9c1c3117-e125-4801-9f95-b61238308392
Filesize28KB
MD58eadd619bcf23483671d21a0cdb7892d
SHA17fc17f8b8b4c27f376f509123b07c446978ccb3e
SHA2560da797cc8e0749e54085ad0939c109ef90f85389cc1ea7dbdb2463f43ae81990
SHA51206a72d9a613e3cf7d8294fa0174d8f7277d6985ffd32759b057ab4279df0e0aa31473d76c8ec6562ea6f77c283bf9cea1e23e37ea0b31ebdfd7b52547e7d702d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD52a06e6462f88af8365387616e5cda21b
SHA1789d2e583dc6a62b60d367eb047668f987a4c0d7
SHA256db8c8a2b01a54fc6652d12a433642f579579739eb73f7a4c89bb75588ab085ee
SHA512207074cc33fafadec734883e6a017fb3e2dc3e1fe94cab7db529fa9da68e38c39f09659714044ee69aee861a77ad6d9a0dd43a8027173b54f9f4e27eb4a62021
-
Filesize
12KB
MD5282a9926d67a4ed9611e245d1903949e
SHA1856269d2ee75d1917b11fe6d2e1f0eea8e3a1404
SHA256b505ce2dd3d928dc3c72b2f7e1a816348b2802a065abab318922aa7a4e32ed1b
SHA512556ec9b8d063725d6b753430bee2bdc5333ca461a0702c332e90ab12ff7456dbe55d78f4494f77fc1f93cf25e8b3edbfa665b2a6bb8ae45b97e4a46c989f9131
-
Filesize
15KB
MD52c1df5602082b354a33a22c8d52b8fe6
SHA105f3109bba97616bb771f8101b7a094b4dc04e68
SHA256ce0e61ea701928901447b5b7d1711e7afc3db36c211c6c1fe643208461e2c2ed
SHA512c7c7d481a8ab3de92c9d73d1a3a8b443794c4430dd8892d18483615524f8a51f5b32db741a3770c932ea7c094b04d4269757abcdbf2d6cf1fcd6bb02931381a4
-
Filesize
10KB
MD58815d771ffc7e3a041866e43246e61d9
SHA10c78152ffcd06b818ab7398aa60a5e7e792e32e2
SHA256f1a81ca00735822eb63f9d1324cca9475069a9b982b84298ae46b9589d5fdcf5
SHA5124e825aa6bfe47bb8b654a5723f451bfe184776701bb62af1676ad2f2348f74c637da8e0b9066df7102b3b603a8cbcb78d9850f0c4fae4ae18673f26dbae9c985