Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 01:20
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
377b0bad7a7f2b18daaafd0c29158bd4
-
SHA1
ed9a5c3e2c34871f64bbaa0dedfdd8482f21bb6e
-
SHA256
97f29e138df5a6bacf5533fc5536c034efc49f6eba97a22bc52ac5aca89a69d9
-
SHA512
405d1c84cd8524662f0bcb3eca2ded371b41887e243a6b473fd9acc46e77d17c451d484f05e9528c30db0fb4e342dcebb2139223e29fc37e4e29c8856ecf917f
-
SSDEEP
49152:aOzSjDNxr0qN7zA7ij4y8xeC3NjEf4VzBrXBD3SSzxuIeeRON:md0qN7zA7ij4yUeC3s4lBw4S6ON
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://necklacedmny.store/api
https://founpiuer.store/api
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 132b442a55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 132b442a55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 132b442a55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 132b442a55.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 132b442a55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 132b442a55.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fc20622ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3be1974aa4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 132b442a55.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 132b442a55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3be1974aa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3be1974aa4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fc20622ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 132b442a55.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fc20622ee.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 1624 skotes.exe 2192 6fc20622ee.exe 1748 3be1974aa4.exe 2156 eb1a693e55.exe 1104 132b442a55.exe 5612 skotes.exe 1796 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 6fc20622ee.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3be1974aa4.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 132b442a55.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 132b442a55.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 132b442a55.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6fc20622ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003524001\\6fc20622ee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3be1974aa4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003525001\\3be1974aa4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb1a693e55.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003526001\\eb1a693e55.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\132b442a55.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003527001\\132b442a55.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023ca1-69.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1180 file.exe 1624 skotes.exe 2192 6fc20622ee.exe 1748 3be1974aa4.exe 1104 132b442a55.exe 5612 skotes.exe 1796 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fc20622ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3be1974aa4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 132b442a55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1a693e55.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4456 taskkill.exe 4852 taskkill.exe 2172 taskkill.exe 4876 taskkill.exe 3796 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1180 file.exe 1180 file.exe 1624 skotes.exe 1624 skotes.exe 2192 6fc20622ee.exe 2192 6fc20622ee.exe 1748 3be1974aa4.exe 1748 3be1974aa4.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 1104 132b442a55.exe 1104 132b442a55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 1104 132b442a55.exe 1104 132b442a55.exe 1104 132b442a55.exe 5612 skotes.exe 5612 skotes.exe 1796 skotes.exe 1796 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4852 taskkill.exe Token: SeDebugPrivilege 2172 taskkill.exe Token: SeDebugPrivilege 4876 taskkill.exe Token: SeDebugPrivilege 3796 taskkill.exe Token: SeDebugPrivilege 4456 taskkill.exe Token: SeDebugPrivilege 1352 firefox.exe Token: SeDebugPrivilege 1352 firefox.exe Token: SeDebugPrivilege 1104 132b442a55.exe Token: SeDebugPrivilege 1352 firefox.exe Token: SeDebugPrivilege 1352 firefox.exe Token: SeDebugPrivilege 1352 firefox.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 1352 firefox.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe 2156 eb1a693e55.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1352 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1624 1180 file.exe 87 PID 1180 wrote to memory of 1624 1180 file.exe 87 PID 1180 wrote to memory of 1624 1180 file.exe 87 PID 1624 wrote to memory of 2192 1624 skotes.exe 92 PID 1624 wrote to memory of 2192 1624 skotes.exe 92 PID 1624 wrote to memory of 2192 1624 skotes.exe 92 PID 1624 wrote to memory of 1748 1624 skotes.exe 98 PID 1624 wrote to memory of 1748 1624 skotes.exe 98 PID 1624 wrote to memory of 1748 1624 skotes.exe 98 PID 1624 wrote to memory of 2156 1624 skotes.exe 99 PID 1624 wrote to memory of 2156 1624 skotes.exe 99 PID 1624 wrote to memory of 2156 1624 skotes.exe 99 PID 2156 wrote to memory of 4852 2156 eb1a693e55.exe 100 PID 2156 wrote to memory of 4852 2156 eb1a693e55.exe 100 PID 2156 wrote to memory of 4852 2156 eb1a693e55.exe 100 PID 2156 wrote to memory of 2172 2156 eb1a693e55.exe 102 PID 2156 wrote to memory of 2172 2156 eb1a693e55.exe 102 PID 2156 wrote to memory of 2172 2156 eb1a693e55.exe 102 PID 2156 wrote to memory of 4876 2156 eb1a693e55.exe 104 PID 2156 wrote to memory of 4876 2156 eb1a693e55.exe 104 PID 2156 wrote to memory of 4876 2156 eb1a693e55.exe 104 PID 2156 wrote to memory of 3796 2156 eb1a693e55.exe 106 PID 2156 wrote to memory of 3796 2156 eb1a693e55.exe 106 PID 2156 wrote to memory of 3796 2156 eb1a693e55.exe 106 PID 2156 wrote to memory of 4456 2156 eb1a693e55.exe 108 PID 2156 wrote to memory of 4456 2156 eb1a693e55.exe 108 PID 2156 wrote to memory of 4456 2156 eb1a693e55.exe 108 PID 2156 wrote to memory of 1336 2156 eb1a693e55.exe 110 PID 2156 wrote to memory of 1336 2156 eb1a693e55.exe 110 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1336 wrote to memory of 1352 1336 firefox.exe 111 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 PID 1352 wrote to memory of 5036 1352 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\1003524001\6fc20622ee.exe"C:\Users\Admin\AppData\Local\Temp\1003524001\6fc20622ee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\1003525001\3be1974aa4.exe"C:\Users\Admin\AppData\Local\Temp\1003525001\3be1974aa4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\1003526001\eb1a693e55.exe"C:\Users\Admin\AppData\Local\Temp\1003526001\eb1a693e55.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {510d2c11-0ad4-4b34-86dd-4311a37d537b} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" gpu6⤵PID:5036
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d72eb9e-0249-45d7-8a23-bac8303b166e} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" socket6⤵PID:1784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3408 -childID 1 -isForBrowser -prefsHandle 3372 -prefMapHandle 2908 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82de61fb-b1fa-4dd0-b9a7-2f221da2680d} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab6⤵PID:1020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3980 -childID 2 -isForBrowser -prefsHandle 3972 -prefMapHandle 3968 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d884d5f-2b10-447b-b55c-31c17407bd25} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab6⤵PID:4148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4852 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7ddd5932-197b-47b6-b5fb-0fe153709fbb} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" utility6⤵
- Checks processor information in registry
PID:5424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5448 -childID 3 -isForBrowser -prefsHandle 5440 -prefMapHandle 5408 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f6aad40a-4b58-4f03-aa1b-fd284989e8b9} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab6⤵PID:5984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5572 -childID 4 -isForBrowser -prefsHandle 5652 -prefMapHandle 5648 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8708cb91-4505-43b1-b57d-e15074657994} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab6⤵PID:6000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5752 -childID 5 -isForBrowser -prefsHandle 5760 -prefMapHandle 5764 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cefc94bb-f3ec-4761-aad5-c5af8cb28e1c} 1352 "\\.\pipe\gecko-crash-server-pipe.1352" tab6⤵PID:6012
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003527001\132b442a55.exe"C:\Users\Admin\AppData\Local\Temp\1003527001\132b442a55.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1104
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5612
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD50958be31187cdf4e64cd8654734d9bb2
SHA1c5718f7d43d9ed918de8b623543d4b78c315e175
SHA256209768f0eff9e988f660b247e3ec87b6d20f3f7a083ffd86b757d3c94b71b4ea
SHA512ceed57bb221c51c4d2d35abd18e12c6f005cd7d630d3e9fe413eb930dd79db4bf6cbb0181e588aff510bf0c4641e04639ecce5bd95f2c7b27991e2d4a82eced5
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5bbc0b4c2ef39cd4f07554a6ff75fa038
SHA1885efbb98c0446ad760ebfdc0d5d7c7e4a78d892
SHA256f66f9f4389fc53914e65fb4d4eccfba21693ede443c1cac51bb5171f98ceafa1
SHA5124649f5439b2b7b7685db3ca9df1c604d3a953845c14ff66a002a8bf929621ac4a62b81c27e4661b92e176d9aade2f77c2e4800fabd5b47be2db42be913ba2a6b
-
Filesize
2.8MB
MD50dfbe9409540e1b6f95913d562857f51
SHA1025db6cd5089820520d657ae0854434747a8a3d1
SHA2566b22d26911eb66569332d90e75f680c8247ecaa68c7e774a6890853120c584f3
SHA5121d2e447e4a5c356680720adf73d1d4aa14bac505ab4e86066db86562b40fdd3f3cc72d0b9c6303ba4becaa8d00cab4f92d43a78e8c2bd502392cba1ff64b88a6
-
Filesize
2.0MB
MD51149738b919e0ab60f39d1d13f28ed38
SHA10ac124e06a56d9eec96615026c96c5e8eb4564dc
SHA2567beee0686c1fe27da85f72d6631dc483466916fba5737102b4e7e136acdf295b
SHA512d646bac6e8944c82c1e1f25c3d6bb4804bc8ce3dae1ffcf70d73dfe0b030c9b3805e5ac6959c4819015aab85376f4bc782503138df8d0ce808b187d9e2e1d332
-
Filesize
898KB
MD552b9f4d14b213ededa458cd8ba71bdb0
SHA1ed2da581a4d1f10775320e026e908e148e6788d2
SHA256eaae318be46a245eea165b0001297c9f1a082a3f520a9f20d883207161c07769
SHA512040d0977caed826fd3bca2d305dc2d985e0298495883554b279085626f950dd3e89302617df34e8591f19be11c6d1a55e349c6d44d834e12540255b22c3e38f3
-
Filesize
2.6MB
MD51d4231215484aa5c0b4143a05d213d35
SHA165a6c675a4d3967ace2444dc1563eb190d65bdc7
SHA256b111e5e7d87cdfe8e5525fd5398ec5967d9c008b67a9e0a9b9203c0fd1fa3d5f
SHA512771fcdb74bd431c6a2b15d79c605489d9cba9b16d4bd386e6ff51c1d47e7fbe72cc202afa1527cab391ceaddef4eaacff65aa0812a5dd4af90db96d91936b5d4
-
Filesize
3.1MB
MD5377b0bad7a7f2b18daaafd0c29158bd4
SHA1ed9a5c3e2c34871f64bbaa0dedfdd8482f21bb6e
SHA25697f29e138df5a6bacf5533fc5536c034efc49f6eba97a22bc52ac5aca89a69d9
SHA512405d1c84cd8524662f0bcb3eca2ded371b41887e243a6b473fd9acc46e77d17c451d484f05e9528c30db0fb4e342dcebb2139223e29fc37e4e29c8856ecf917f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize7KB
MD549d2388ed32d4b1f98245df47adc7858
SHA107d64dea650c9bd086ffdcb3f1e846dac36b288f
SHA256a24bb39f4c3ff29561c644955640e22833f711afe5f89275f12079f1bce784c1
SHA512787dc8736942c7887ab92398b3aa0b575cea86a17c48d2a192f5d0bf949386de99d13efc678692d99a4b5083923c665504be0e3820f89a247740dd1f57684eac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize13KB
MD52e982f69ddca86d55b5ec4ae5973278b
SHA171cf0c1f5aebd6103849ae5cd1e859dce3143525
SHA25627b2e9aa4705abf7dc720336f687cdb08a42e7125be810eb941b1de340da3c16
SHA512537382bcdd5d618841105826d256dfb714556de68e2974f788a322dd4cd02526f3f2f7247c55ec155b74fc3b47ef7464edd081aed5e7d740980b46e6aa0cf4d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5b551ab05b390d365205c14fdc4760701
SHA1b17d4979ae137e82d5e41aaa6b652f535ce0ecd1
SHA2564644bcd8822adf6d22bf44449f1dbbeedddc4a167b27373d0a21624641bcc8c5
SHA512081456e08803884a74d789bdce49e09294677b6fe80c0d30d13fde76ed8560a1c4f1cec49edcfd8a983c8c5f721058a582ae172ff8ca83bc91cd9f487a979318
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5512fc2742c7518e279ce8674489e59e0
SHA1f7e621c473ad8ca203900af73edfae2d738f6848
SHA25616d2116738932cb4ba18a05092ece048e1e9aca6593e2bda285361d0fad5c013
SHA51286dd7a018188e0bd6d33d792f2d0b9002b78e3202f3f93b52befe719493dcf26675f016e81fdbbdd42ec3a4549a2e9fea3c96e07208c07ad83b0e5fe3799c74d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD583ab5c92635ea8a2e9f3a8f07d347eea
SHA1edccc3658c57d405d39c78eb4e8ac340ba7e9377
SHA2565d622b45b7944410d770dcfd3756e59bc3ae3272aa6e24d5ac4fd9e0ba748115
SHA5123e89e2dda6dad876bf69fbd56eb59fe7a7f2faa0667eeacc55cc3bc74a9ecc3dac8c9b611e7b00b205f9a95ff09bef1f4f09f7ac221c04eb869fd9cb1962dc6e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5fd88e303b87e9e31fab92cde02b8d51c
SHA145b70aae7d79c529725eaae7fceaa9fafd5d5767
SHA2561b3719553f36008325118fe0bdc217fe80f3b49e9140ac9ff5545dd165454a69
SHA512377498ad11d046dc8c4696b7b01c8944fced537e9fe826e6bbb662da11bd22b454ddfb36c2733b4eb790248404c5dde6cee3531e8a992a878148a075e7d61199
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD59d27a38f8ed40263ad0d82b3986e29fb
SHA1b758017e85e4c50eb12bdf79b2592b1ff725065c
SHA256377c99b40c8149a587ff8b44901d4fe5f83c540b7f617357e315b281f6fcc647
SHA512224d1ecba452c0cdcff07bdb522cbc56ae5926e3e520948483018f415f6202178ee4451998ad19ce36a175a9895c90570155eb0f348318a69c0c8eebfb66d720
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\0f79de19-e0d9-4d1d-984f-5ea13ec8958f
Filesize982B
MD5e9872e5bec99db4a08994a59b009ee59
SHA155d1ec7637765d943be56579fe69afa5f0e72f84
SHA256131e58c2342092072dd743eae360a29836409c620ab920643a5ab59618cc1d0b
SHA512b3aad794f5849f1c8138889dcf9bf4b25334e64f18ec1bf1f6e006bfcfb9a83d85edc6990168fbc31dc9630ea5a06eee7f18644a57555fefc61b3e4522c38e14
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\98a9df1f-41a5-468a-bd1d-9ed7c2552c82
Filesize659B
MD5f81cc94da857520ffd9952d75e5cd097
SHA17abd7fed466c3dbfd795341d45b45c39a0634d77
SHA256dd84fd74ac429d29c9626dffdbd28539bfbb00dfd9a2ad2622b2fdd0c1655e6a
SHA51264f8ab2cfa6f367a1a8f069848eba4e584407c92a9c50fdc82659ca86b8682fa175849f6893baad3fdd1dc88f88b1fd78b030ea647adc3ba1a7c76989213dd0c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD58d150f26f95b282be8059eb35539f243
SHA148efa56e17c7580edfb9ac48060f8e3ed6159c68
SHA2566453c86d643c7aa41f7f17ed8e33304b638f15ee60fc88cfdb0e30b9759d34f8
SHA51216830f106fb05bd28e0ca213a85b84ba006db3ee04b33729978daacd55c1fbb36bd2ad77fd73398ce90b2325172fdb55832f32ba3b3a17a5192cee86efbb21cc
-
Filesize
15KB
MD5f3f35c53fcac07bf19e21474f6639b1b
SHA1e18623acbca1e11fd9625e36e78649f383be2b67
SHA2569bbfe42a3fdab581c99e20c4f27a6865542727f641918bfdd15ae099233bd6f5
SHA5122c8d056f70b14319878a7e9632c5cd100026f137da0df6983d869c53346adc7a92dbbc2ca02aab4bace41367e6ac437e0ad3c31111fb3f17015d2736ccd108bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.1MB
MD56760ebedcb0eb8a0f97e4ee9cd109b07
SHA13ca28c5c6dd735f8387d72a2f479e1a7a333c24a
SHA256539c6cbb9f53c77a75396e045f2fa3671eafd651e6087fb498446a265881afa7
SHA512f727dc5712c0160fe8ea0e7d6e9b200cb1ac30feb86b40f6741e54b4356536c25e60f0b8ce2166d445ad79bce2aa3a8a32b219f23941cfdc8ba475702e9118d3