Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
36cde0f98ab8a93df2c3134ab9771502
-
SHA1
d778b355d36d12d05562bed3f78af22c944eb575
-
SHA256
6d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261
-
SHA512
a79ef6f322657769550e03f1734b88c1a3b330ec6523f5fa444066cea7bc1dfd2df41833d9c99380209f2e25d1685c81dbc9eee948aa30678ff8a54a3b4c5d80
-
SSDEEP
49152:og8DDIyU/xbvZJzwSmaOLxmeHpEeeJxs18eM9C:ogGDIyU/xbvXzwSmBtzHp8zs8eM9C
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection abce51d436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" abce51d436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" abce51d436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" abce51d436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" abce51d436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" abce51d436.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfbe261a8a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c8e5bb9074.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abce51d436.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abce51d436.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfbe261a8a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c8e5bb9074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c8e5bb9074.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abce51d436.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfbe261a8a.exe -
Executes dropped EXE 5 IoCs
pid Process 2832 skotes.exe 2996 cfbe261a8a.exe 2072 c8e5bb9074.exe 1160 5f83211613.exe 2468 abce51d436.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine abce51d436.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine cfbe261a8a.exe Key opened \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Wine c8e5bb9074.exe -
Loads dropped DLL 7 IoCs
pid Process 1488 file.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features abce51d436.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" abce51d436.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\cfbe261a8a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003927001\\cfbe261a8a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\c8e5bb9074.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003928001\\c8e5bb9074.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\5f83211613.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003929001\\5f83211613.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\abce51d436.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1003930001\\abce51d436.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4b1-87.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1488 file.exe 2832 skotes.exe 2996 cfbe261a8a.exe 2072 c8e5bb9074.exe 2468 abce51d436.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfbe261a8a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8e5bb9074.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f83211613.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abce51d436.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1632 taskkill.exe 2380 taskkill.exe 2268 taskkill.exe 1636 taskkill.exe 2344 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1488 file.exe 2832 skotes.exe 2996 cfbe261a8a.exe 2072 c8e5bb9074.exe 1160 5f83211613.exe 2468 abce51d436.exe 1160 5f83211613.exe 1160 5f83211613.exe 2468 abce51d436.exe 2468 abce51d436.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1632 taskkill.exe Token: SeDebugPrivilege 2380 taskkill.exe Token: SeDebugPrivilege 2268 taskkill.exe Token: SeDebugPrivilege 1636 taskkill.exe Token: SeDebugPrivilege 2344 taskkill.exe Token: SeDebugPrivilege 876 firefox.exe Token: SeDebugPrivilege 876 firefox.exe Token: SeDebugPrivilege 2468 abce51d436.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1488 file.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 876 firefox.exe 876 firefox.exe 876 firefox.exe 876 firefox.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 876 firefox.exe 876 firefox.exe 876 firefox.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe 1160 5f83211613.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1488 wrote to memory of 2832 1488 file.exe 31 PID 1488 wrote to memory of 2832 1488 file.exe 31 PID 1488 wrote to memory of 2832 1488 file.exe 31 PID 1488 wrote to memory of 2832 1488 file.exe 31 PID 2832 wrote to memory of 2996 2832 skotes.exe 33 PID 2832 wrote to memory of 2996 2832 skotes.exe 33 PID 2832 wrote to memory of 2996 2832 skotes.exe 33 PID 2832 wrote to memory of 2996 2832 skotes.exe 33 PID 2832 wrote to memory of 2072 2832 skotes.exe 35 PID 2832 wrote to memory of 2072 2832 skotes.exe 35 PID 2832 wrote to memory of 2072 2832 skotes.exe 35 PID 2832 wrote to memory of 2072 2832 skotes.exe 35 PID 2832 wrote to memory of 1160 2832 skotes.exe 36 PID 2832 wrote to memory of 1160 2832 skotes.exe 36 PID 2832 wrote to memory of 1160 2832 skotes.exe 36 PID 2832 wrote to memory of 1160 2832 skotes.exe 36 PID 1160 wrote to memory of 1632 1160 5f83211613.exe 37 PID 1160 wrote to memory of 1632 1160 5f83211613.exe 37 PID 1160 wrote to memory of 1632 1160 5f83211613.exe 37 PID 1160 wrote to memory of 1632 1160 5f83211613.exe 37 PID 1160 wrote to memory of 2380 1160 5f83211613.exe 39 PID 1160 wrote to memory of 2380 1160 5f83211613.exe 39 PID 1160 wrote to memory of 2380 1160 5f83211613.exe 39 PID 1160 wrote to memory of 2380 1160 5f83211613.exe 39 PID 1160 wrote to memory of 2268 1160 5f83211613.exe 41 PID 1160 wrote to memory of 2268 1160 5f83211613.exe 41 PID 1160 wrote to memory of 2268 1160 5f83211613.exe 41 PID 1160 wrote to memory of 2268 1160 5f83211613.exe 41 PID 1160 wrote to memory of 1636 1160 5f83211613.exe 43 PID 1160 wrote to memory of 1636 1160 5f83211613.exe 43 PID 1160 wrote to memory of 1636 1160 5f83211613.exe 43 PID 1160 wrote to memory of 1636 1160 5f83211613.exe 43 PID 1160 wrote to memory of 2344 1160 5f83211613.exe 45 PID 1160 wrote to memory of 2344 1160 5f83211613.exe 45 PID 1160 wrote to memory of 2344 1160 5f83211613.exe 45 PID 1160 wrote to memory of 2344 1160 5f83211613.exe 45 PID 1160 wrote to memory of 1856 1160 5f83211613.exe 47 PID 1160 wrote to memory of 1856 1160 5f83211613.exe 47 PID 1160 wrote to memory of 1856 1160 5f83211613.exe 47 PID 1160 wrote to memory of 1856 1160 5f83211613.exe 47 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 1856 wrote to memory of 876 1856 firefox.exe 48 PID 876 wrote to memory of 1720 876 firefox.exe 49 PID 876 wrote to memory of 1720 876 firefox.exe 49 PID 876 wrote to memory of 1720 876 firefox.exe 49 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 PID 876 wrote to memory of 2932 876 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\1003927001\cfbe261a8a.exe"C:\Users\Admin\AppData\Local\Temp\1003927001\cfbe261a8a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\1003928001\c8e5bb9074.exe"C:\Users\Admin\AppData\Local\Temp\1003928001\c8e5bb9074.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\1003929001\5f83211613.exe"C:\Users\Admin\AppData\Local\Temp\1003929001\5f83211613.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.0.1486497301\2068725767" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4866e5c0-b5a6-44f0-9ad5-53a60bee0fc2} 876 "\\.\pipe\gecko-crash-server-pipe.876" 1360 102d7158 gpu6⤵PID:1720
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.1.106093351\1452965767" -parentBuildID 20221007134813 -prefsHandle 1520 -prefMapHandle 1516 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {667913b9-ac8c-4cd4-a4dc-faed112fb6ac} 876 "\\.\pipe\gecko-crash-server-pipe.876" 1544 f3f9258 socket6⤵PID:2932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.2.710258430\1197167587" -childID 1 -isForBrowser -prefsHandle 2008 -prefMapHandle 2004 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 660 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f44c63e7-d612-47e3-a969-42c47fbff805} 876 "\\.\pipe\gecko-crash-server-pipe.876" 1932 18fd7b58 tab6⤵PID:3060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.3.454511151\1988824565" -childID 2 -isForBrowser -prefsHandle 2764 -prefMapHandle 2760 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 660 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {512450e9-1f81-4ac4-b734-89e3e70a7e0a} 876 "\\.\pipe\gecko-crash-server-pipe.876" 2776 d64b58 tab6⤵PID:1344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.4.1073738145\1304623557" -childID 3 -isForBrowser -prefsHandle 3612 -prefMapHandle 3608 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 660 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d501c72d-80e7-49d8-843d-700e87d827b5} 876 "\\.\pipe\gecko-crash-server-pipe.876" 3624 1e896258 tab6⤵PID:2848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.5.976247923\1618889206" -childID 4 -isForBrowser -prefsHandle 3780 -prefMapHandle 3784 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 660 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6945627b-56cb-4dc8-aaf4-f6553bbaa2be} 876 "\\.\pipe\gecko-crash-server-pipe.876" 3764 1e896b58 tab6⤵PID:2808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="876.6.1138229786\1566866881" -childID 5 -isForBrowser -prefsHandle 3948 -prefMapHandle 3952 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 660 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f4f57af-5538-493e-afb6-b25b7c533679} 876 "\\.\pipe\gecko-crash-server-pipe.876" 3936 1e898958 tab6⤵PID:2088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1003930001\abce51d436.exe"C:\Users\Admin\AppData\Local\Temp\1003930001\abce51d436.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5242fb76286670667c3ebd02d8ce97b1b
SHA18dfeaa3925dd11b0b34c846ac3e0244b21c61bd6
SHA256eb098e1939714da95138789d7cafb5dbde03372dcfac8fdbe1602658c25a4cb1
SHA5126bf34ecf71dfbfbf4bdd60844ebc96d6eb52dfbe98f7bc9d9031326b574ec157c0ff663fad214ea448770b1d469106f1dc9d6b807308293ab5deb2a07442f282
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\xmhyv50e.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.1MB
MD5d1629f3c794978e4a261000d117014dc
SHA1b688470e41b98c49a4710c2b20b458d3bb50ef83
SHA25697b18507cb1ab250f8d1669ce402d79fdbaefb530cce505aa995c861d8ebd946
SHA5121abbb3141e2c3fcbbe2828c9e90dcbce460ce622b972ec57a0fcc236cbf709e454031d5e0bdc15aab96e83de3bcc0c2d625b1a610f72eafe9c7d3c25d168e006
-
Filesize
2.9MB
MD5d4d8406aa8da86e06a9fe0942d4e7eb8
SHA1c2d2503604f1af2cc099af2021bb544b0a563c20
SHA25657a15eecd54ed9592c6d49f6b5a562ed44c049f1265ecf7b42a90569dc8f8740
SHA51278f7dac660bd11af6ac985d4f00397258b05c083479677797b7e23a5675b33ed3a2b09f2801166a34a15480734554277133a5dbe030edab4b081df51e8e47e7e
-
Filesize
2.1MB
MD5bbcc32dc6b38c304fd1e85e156e19753
SHA1b1afa09577e219950778ee0336ecc59ea9d19f04
SHA2569424a09ca4319cd342a64203eda4b47c4e48b96c5194e90c55e40f34c2601387
SHA5128f2a5aa684f6876d97e0f6ac4ac378429af0b09a1b956a42444eed9b54629469acdc7ef6a97aab3f75d4bdc0dd47c4d21dd3166562af15e0a49beede5346ca7d
-
Filesize
898KB
MD51457784f97d654dfd7d73c4cad6ea9f2
SHA18c25f13fda185e4483a16875cd7aae12d72218cc
SHA256fd33b5db9287f300da950c3e33b68e23c1f4af6cccaef2cc2f438d9fd14cd0ae
SHA512bf0768ba7c5640ba6217900757e0f922ce37c599dd029aea0c03f627dc5ce2b71c0c099ab05c32d7c0dbecd9e170a42f5b429b690abea1765493ee21a6b8d72d
-
Filesize
2.7MB
MD5e7b10ceb762ed99e7ad95e5b05374251
SHA1bf0476b8cf97b5daebe824eaebec44068d5db670
SHA256f2f4363f5e35a19d03c81d559498b214c94526fdc6c5aa1d9ce49b97d5e83f8d
SHA512925154bff3163ba6cf4d4f44d0ad38739f0c8a6593d5655fbdcc7f7b1809499340cf098c30c696af683a7d4f22ef9b5afa1209f39c25f544288121444a08fe3d
-
Filesize
3.1MB
MD536cde0f98ab8a93df2c3134ab9771502
SHA1d778b355d36d12d05562bed3f78af22c944eb575
SHA2566d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261
SHA512a79ef6f322657769550e03f1734b88c1a3b330ec6523f5fa444066cea7bc1dfd2df41833d9c99380209f2e25d1685c81dbc9eee948aa30678ff8a54a3b4c5d80
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5e07f0e77454f7924058093b65371a9ae
SHA191371a1ab559ebb7cbead8ff0f86c36876fbce4a
SHA2562128ad0a10ec541f0c599ad003d406d37bfd4512f83ede1d460a2e3363895c45
SHA5127326aae0b35ac268802da7f9ca71e8ba1cd0f5ac061a9b62a381d08069d6f97e4120bf16509987ea181e1533c450a1b6e64118db3e05e31081579e7012768998
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\7c8f2429-b367-48ae-a8b2-dddb400bb638
Filesize10KB
MD5e9085e18c5ce1dab77a09bc4faac3d83
SHA11d820bc72b49b6c3fd847d5de5215e0693263196
SHA2560d07637bc04deea7ea9568d73ff17c7e92e6e93c459379a801d157f6501734e8
SHA51289825eee721a46cfb221d9c661714309107ed7f7a82e3c08d659326f498b6f9ecb269e3614bf08cd32045de69c66ae1d65c52080113f66212dc63d169a832725
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\datareporting\glean\pending_pings\b1f433aa-cac5-47b7-947d-afc11cdc5cfd
Filesize745B
MD53c45474921331ab7ca739a4b329fab6b
SHA115ec5a32f4e8613072a6fc1a2aaae720e489b6a5
SHA256a2ca51184421793ed10fe44a3405894fb4b2c86e415f459bd1a30ae40585f990
SHA5122c9cc8c4fabbfa45885b9b89c6a374a1a2f4a69361d96df559b29fce6e842ee563ba4cd382040ff2b2956e4f1adeea9300fd9b2a200e3f827c53390fb9292a2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD52808aa7f1b0b75b16d2c023f2284c624
SHA18f2dd146d9171851ee77421e65c41eafd5fd29e2
SHA25664f8daaaaf24a4269af6c58893404396e54952c2d649b6ff57e47e2b6dfc30a1
SHA512296797fd5ea8ee21820a907050ee0735483e777681fb16f4fede2ec9ea4f11292e481de8b2d221792bc8469b75c2e1b392f204650ed0c8d673418839feddb9af
-
Filesize
7KB
MD5a93406ba5d94823d5022986bae1f85a7
SHA1b8be0ebcd89aebd8df3ef79ae808564bdb0bd738
SHA256767d71f9bd3c466c659325ac129bb7c7c0dd9ee3929ca3772dc8849ff940b862
SHA512da15587fae846287e6b513dec8aad5a04d573ceb73fa721e98864b533184d734a6a5765c6f07f8d97c08796edd21255c3efc496645b366b987ccd1ec6307998e
-
Filesize
7KB
MD5af678df9169d79fb0c0a1ae71f68f429
SHA1faf9cc94d89af73877de5619da6acd56db27d8de
SHA256f5f10f96318460bacc014a909de64ded622ed73ec70edc21e54c8f85bd6a4cfa
SHA5127b11b28a129119752ce5c59bde152b1cae9f70a6699e461bde5aa563d854fbe149ac4bac4a5bcf4fff045e57db4f0bee8371e86d5ba7b69989580b0b74b85e18
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\xmhyv50e.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5ecf28c11ce4e2b70ed589d0b07099e1d
SHA1eb39c8bbf421cb5be9edd06f04026e4cc0ea3423
SHA256d772cec7a75da56da8e3e4436888204a55aaf8aa16625a06860e42c133b8e7e0
SHA51280c59ef2dbe3a7852b68bc0cc653fdf7c351f129ca8141c29afb785b84e95e4675f09c75ea1f1b279be9d234bf70ea4fd30bade0d551a19920bab41469627cfa