Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe
Resource
win7-20241010-en
General
-
Target
f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe
-
Size
1.8MB
-
MD5
3553ec492baf74513560f2bcfcc8be4b
-
SHA1
4a85bcce9da53127e861c53445c88f0c4b772ccd
-
SHA256
f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d
-
SHA512
8460740f9e684bf7ccd2f9986b5d8ef5610d6dd227369803760fc6efeb04a6270372a7a892b253f1d82539f4c2f69231c4aba4246a9c1d102e8ef6bc18efd882
-
SSDEEP
24576:he4oKO3eOKdCzYTtYiO7SO6lWLALX/0ZPcYMK8PHbAtMAzZmQdRcNHOKtxSps0cc:MKQxpz6tYUL/0ZURHbG9N0NHOAwBga
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2a5dc65038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2a5dc65038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2a5dc65038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2a5dc65038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2a5dc65038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2a5dc65038.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6e52bca59c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a5dc65038.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db8a2ca1f8.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db8a2ca1f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6e52bca59c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6e52bca59c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a5dc65038.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db8a2ca1f8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a5dc65038.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 4804 skotes.exe 1184 db8a2ca1f8.exe 2216 6e52bca59c.exe 1272 030458c316.exe 5048 2a5dc65038.exe 5764 skotes.exe 5156 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine db8a2ca1f8.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 6e52bca59c.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 2a5dc65038.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2a5dc65038.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2a5dc65038.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\db8a2ca1f8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003520001\\db8a2ca1f8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6e52bca59c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003521001\\6e52bca59c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\030458c316.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003522001\\030458c316.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2a5dc65038.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003523001\\2a5dc65038.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cde-66.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 4804 skotes.exe 1184 db8a2ca1f8.exe 2216 6e52bca59c.exe 5048 2a5dc65038.exe 5764 skotes.exe 5156 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db8a2ca1f8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6e52bca59c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a5dc65038.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 030458c316.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1904 taskkill.exe 548 taskkill.exe 3344 taskkill.exe 1008 taskkill.exe 4124 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 4804 skotes.exe 4804 skotes.exe 1184 db8a2ca1f8.exe 1184 db8a2ca1f8.exe 2216 6e52bca59c.exe 2216 6e52bca59c.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 5048 2a5dc65038.exe 5048 2a5dc65038.exe 5048 2a5dc65038.exe 5048 2a5dc65038.exe 5048 2a5dc65038.exe 5764 skotes.exe 5764 skotes.exe 5156 skotes.exe 5156 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1904 taskkill.exe Token: SeDebugPrivilege 548 taskkill.exe Token: SeDebugPrivilege 3344 taskkill.exe Token: SeDebugPrivilege 1008 taskkill.exe Token: SeDebugPrivilege 4124 taskkill.exe Token: SeDebugPrivilege 1880 firefox.exe Token: SeDebugPrivilege 1880 firefox.exe Token: SeDebugPrivilege 5048 2a5dc65038.exe Token: SeDebugPrivilege 1880 firefox.exe Token: SeDebugPrivilege 1880 firefox.exe Token: SeDebugPrivilege 1880 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1880 firefox.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe 1272 030458c316.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1880 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 4804 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 87 PID 2428 wrote to memory of 4804 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 87 PID 2428 wrote to memory of 4804 2428 f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe 87 PID 4804 wrote to memory of 1184 4804 skotes.exe 94 PID 4804 wrote to memory of 1184 4804 skotes.exe 94 PID 4804 wrote to memory of 1184 4804 skotes.exe 94 PID 4804 wrote to memory of 2216 4804 skotes.exe 100 PID 4804 wrote to memory of 2216 4804 skotes.exe 100 PID 4804 wrote to memory of 2216 4804 skotes.exe 100 PID 4804 wrote to memory of 1272 4804 skotes.exe 101 PID 4804 wrote to memory of 1272 4804 skotes.exe 101 PID 4804 wrote to memory of 1272 4804 skotes.exe 101 PID 1272 wrote to memory of 1904 1272 030458c316.exe 102 PID 1272 wrote to memory of 1904 1272 030458c316.exe 102 PID 1272 wrote to memory of 1904 1272 030458c316.exe 102 PID 1272 wrote to memory of 548 1272 030458c316.exe 104 PID 1272 wrote to memory of 548 1272 030458c316.exe 104 PID 1272 wrote to memory of 548 1272 030458c316.exe 104 PID 1272 wrote to memory of 3344 1272 030458c316.exe 106 PID 1272 wrote to memory of 3344 1272 030458c316.exe 106 PID 1272 wrote to memory of 3344 1272 030458c316.exe 106 PID 1272 wrote to memory of 1008 1272 030458c316.exe 108 PID 1272 wrote to memory of 1008 1272 030458c316.exe 108 PID 1272 wrote to memory of 1008 1272 030458c316.exe 108 PID 1272 wrote to memory of 4124 1272 030458c316.exe 110 PID 1272 wrote to memory of 4124 1272 030458c316.exe 110 PID 1272 wrote to memory of 4124 1272 030458c316.exe 110 PID 1272 wrote to memory of 1828 1272 030458c316.exe 112 PID 1272 wrote to memory of 1828 1272 030458c316.exe 112 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1828 wrote to memory of 1880 1828 firefox.exe 113 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 PID 1880 wrote to memory of 624 1880 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe"C:\Users\Admin\AppData\Local\Temp\f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\1003520001\db8a2ca1f8.exe"C:\Users\Admin\AppData\Local\Temp\1003520001\db8a2ca1f8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
C:\Users\Admin\AppData\Local\Temp\1003521001\6e52bca59c.exe"C:\Users\Admin\AppData\Local\Temp\1003521001\6e52bca59c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\1003522001\030458c316.exe"C:\Users\Admin\AppData\Local\Temp\1003522001\030458c316.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {58f0859c-2857-4a2b-8173-6bc5e8d7b65f} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" gpu6⤵PID:624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d83db63b-06df-4ae1-b7b4-62cb4045ef1e} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" socket6⤵PID:2920
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3188 -childID 1 -isForBrowser -prefsHandle 3172 -prefMapHandle 3192 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f459fde8-7d29-405e-96f5-b37969ee27fc} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" tab6⤵PID:1216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2772 -childID 2 -isForBrowser -prefsHandle 3648 -prefMapHandle 3644 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da30bd87-1a02-40d7-bbc7-2f8ae71e721a} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" tab6⤵PID:3324
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4376 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 748 -prefMapHandle 4076 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3743017c-df64-43b3-ab7e-1d2217fc4cc9} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" utility6⤵
- Checks processor information in registry
PID:5284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5416 -childID 3 -isForBrowser -prefsHandle 5428 -prefMapHandle 5424 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec50245c-615d-4b6a-a23d-3cd1abad957b} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" tab6⤵PID:6012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 4 -isForBrowser -prefsHandle 5568 -prefMapHandle 5572 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b81acc2-1c1e-4b51-b172-f228565adc66} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" tab6⤵PID:6024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1288 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1dad4fb-1136-4653-9c37-21a766197f0d} 1880 "\\.\pipe\gecko-crash-server-pipe.1880" tab6⤵PID:6036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003523001\2a5dc65038.exe"C:\Users\Admin\AppData\Local\Temp\1003523001\2a5dc65038.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5048
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5764
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD53eaa17bf3ef89c09951a62e21a30ba79
SHA167da28dcebedc7f5215171e1dab12b3394598d13
SHA256edf4b487ddd1edd8708ff9dabfc77c0a391caf88a53aeee7b99eefc9723fcc47
SHA512dbbf216d7cd8f7607cbbb12c2e73ee5c09e97b78dc648ba6c5327dd9ed9ddf2cbf7b5c0ef68c1dda6137013e168363e16064ad15485712fa668eb0ebcf072cb0
-
Filesize
2.8MB
MD50dfbe9409540e1b6f95913d562857f51
SHA1025db6cd5089820520d657ae0854434747a8a3d1
SHA2566b22d26911eb66569332d90e75f680c8247ecaa68c7e774a6890853120c584f3
SHA5121d2e447e4a5c356680720adf73d1d4aa14bac505ab4e86066db86562b40fdd3f3cc72d0b9c6303ba4becaa8d00cab4f92d43a78e8c2bd502392cba1ff64b88a6
-
Filesize
2.0MB
MD51149738b919e0ab60f39d1d13f28ed38
SHA10ac124e06a56d9eec96615026c96c5e8eb4564dc
SHA2567beee0686c1fe27da85f72d6631dc483466916fba5737102b4e7e136acdf295b
SHA512d646bac6e8944c82c1e1f25c3d6bb4804bc8ce3dae1ffcf70d73dfe0b030c9b3805e5ac6959c4819015aab85376f4bc782503138df8d0ce808b187d9e2e1d332
-
Filesize
898KB
MD552b9f4d14b213ededa458cd8ba71bdb0
SHA1ed2da581a4d1f10775320e026e908e148e6788d2
SHA256eaae318be46a245eea165b0001297c9f1a082a3f520a9f20d883207161c07769
SHA512040d0977caed826fd3bca2d305dc2d985e0298495883554b279085626f950dd3e89302617df34e8591f19be11c6d1a55e349c6d44d834e12540255b22c3e38f3
-
Filesize
2.6MB
MD51d4231215484aa5c0b4143a05d213d35
SHA165a6c675a4d3967ace2444dc1563eb190d65bdc7
SHA256b111e5e7d87cdfe8e5525fd5398ec5967d9c008b67a9e0a9b9203c0fd1fa3d5f
SHA512771fcdb74bd431c6a2b15d79c605489d9cba9b16d4bd386e6ff51c1d47e7fbe72cc202afa1527cab391ceaddef4eaacff65aa0812a5dd4af90db96d91936b5d4
-
Filesize
1.8MB
MD53553ec492baf74513560f2bcfcc8be4b
SHA14a85bcce9da53127e861c53445c88f0c4b772ccd
SHA256f12b81cc245b808bd7af995d30b220fdd1ae3ed65542b6d664ebc107bdec956d
SHA5128460740f9e684bf7ccd2f9986b5d8ef5610d6dd227369803760fc6efeb04a6270372a7a892b253f1d82539f4c2f69231c4aba4246a9c1d102e8ef6bc18efd882
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize18KB
MD50fcbec006d3eece706b7d422dfd7cc68
SHA1691e0091beccdd9d89b2c5a9e954470fd9bc585f
SHA2568b936901812df005abcb1cfc36d919bf2a6639d32d62da1e3d96e39c76332f4d
SHA51236488956b0712e03a15372ebeb0928f792576ca148e34267915d2f2cfd1ed79735d633345ecba81933a1007fd5a20e3b3209acdbf50f2b0c2da13509f0c5ebf0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD5d416bcbf9fa45d7aafb6710982787c08
SHA1dd8354f660a43db565f2733a935e5a6587830f1f
SHA256b4a6684d2e9acdde25015c4ccce6fc9b84357e5ce0f451ba9dcb740c7041fce7
SHA51225d96d9f6f2edc01c22f7a8d3536694f01069d11ffa57b17755b102b9f6fa7bd137ab2aaa313c86beea34b6f8dbb8c6bd90f6699ad077bbca72e0879625989bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize15KB
MD5dfdf36836de102d6f08f015ecc9f5b6f
SHA12dd7c061206af0eba8e735b784e648e44b7b7883
SHA2569b16bae35b71288183351b78ed8f9f77acb593695849094c0977c8f6db3d813e
SHA512548bf50589fa07d7d99c7d55b29484e0bd434e967eb218d9c457aa6fa23299af6c043a6391e895fee5c4f8f095dc8b1c584f82d21c478089018573d3b1aed218
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD535a7057a6ecbb7d22e2f82bfda461cad
SHA16a96c337e543d08d9636c8e4f66e5837d6924713
SHA256efce9e2c060197bed864ed226ffb79fb42aa47265faef34ec53287925a936c41
SHA5128cf31cb23633218505a5ace85dd5b1090034f52600f83393e6283baeabe582b565d120779d6ce9383be619c9b4f4e29d63a889b81bd3e773dba4b15a3a69eb01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5afcae31b2d6cd88f9edbb2521b587baa
SHA11af26158aa75185996daa085325c59b8cac601ae
SHA256dc2299be93c5e509a2b2067da63069fc59fd684351c9f00f9dda385160bc4e19
SHA512ea697e16f25f035cdfddade76135a146c9e29b85b55781ac50498a6c782f418056280cdf604160619275adb9276c37b8099867a258436ea6cd2aeacc2a234cba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD59c31eed83c107f27491dcf5b387c0e5d
SHA1e97bf6f73d64bcf4dba0d3f9e2d041fc0f82ef39
SHA2569f0e3500b239717d950ddde2c1ddea6f203b1a2f427d99834e845725ca913129
SHA5126dfbace20c65e69fd9e393a32e083dc64ecc8166068fa795a758dc3cd8b5dae7d55990a6b1f6e8c86f42de733a531cab5ad8608f6ae98e89d31ae2177257525d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\05bcaafc-c9bd-45c4-99dc-3239fedec048
Filesize982B
MD5b5dd79e1bb5584e5b4db03b183131c51
SHA1f17febefabd910f0b1e554525a0a3cd01d6aa5d6
SHA2561b0b07b438788670edd7c4982e7c3c84d6050388423dc50d31eac208a60dbe63
SHA5126afe34b98fb3ad944a539624fdfc0f3454070df755f3b5880108efe595896be655888fc1c13a1f9bf44d9b30c36db885396651aa7c8bc6e1a95363c20179ee4f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\36e966a7-6379-4882-8bfe-f98619548624
Filesize659B
MD54b669e7c1c1092407752e1ccc8a8682b
SHA185ba22a455543c4931bb6ccba4b2a3f4cfdddebe
SHA25698b3cce505d3a4c9a5abc2a68980f778201d0e94d56e01c60c9a6c344192891e
SHA512c461bf8c9908f6efc6ac2ab8dfdd9654d49f162cfdc7357dd69156bb53aead3241f6d92fc8525fcad99501e061dc9ab367069893066111d5a95774d4ae896b29
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5dfd6c57182e464f48cb5cd9eb8f51f57
SHA1f5925e4eb364dca9588a3dd2727f1379c5206db7
SHA256107b0ead5cfd26bd4ceb901ce8fc56f463062cc328242c36737b2d587c6539f9
SHA5121aabb332b6b49f15c5c9f29994af003abe524480c3245ab6cc6c4962c40d0feca0e884e9b2b99933022ee7c022ba8b26b118b0a57e044a809773277514139a54
-
Filesize
15KB
MD548ca15920ab96445bb6e6071d1d88b95
SHA179a46a70798be87e6f601620cf859085e7b5d4d8
SHA25665b3e259e56f98acc151cb0aafe1a0e9e476ab52de6aacbcf48593b77cee9524
SHA512c5ef929c2a783e78b5fd5061784cef3bac577e6f6cfd0c9346d3f1ebbed112ceac26f34a9b773ff87efee6a40e48fd60c6cc4cfeaecf232008a1106f4060a63b
-
Filesize
10KB
MD561d981d1abbd44827983fb1ce21aa2e1
SHA15f43b119cd5ed869f35551a1e4ca0d56a622f48a
SHA2569f64e4091a48c606726964c14185456eed241079665baf28329d8ffc9189bbdd
SHA5127523e77c72448640c22c289eb852b1d7671a11a5dd7028a95304727c1b623df06fa8f34dbcdee427bda9bb42fda5870a940796543ac2073564c9562ba020cb6c
-
Filesize
11KB
MD5249ffb23e325adbcf95a5580b359a8af
SHA139044be8764d5cfb5e01ea3b1d0ff2d639fdffaf
SHA25634ad91d4b5beaf3868aec6d71caa849d7e544947cca6b8e84a635f70c8ba6871
SHA512ac85729bc58cb02d722f229fb5149c612f749d9439c2c45a6f44cc0026aed4ab5adb5a908556e94c069a558ff2059ad67252fbc0023fc4120cf494f976c2217b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD5faff01e83bafa6f3cd626422fdcd675d
SHA152058a671135948ea55b69adf4455d84bee87d6b
SHA256a0a1315d393cc12e58747bb81ecb1a0a22f586b9a4838c3d82356c60ada22cc6
SHA512057dead31f6bdbeee4a0a8bab32a25350e900d573ffc742936f3641221c9772de4db3e265d389e7e9ce158ff6a19cdfaf28962f9c9bd10badbcaaf1f4bca6b2d