Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 16:59
Static task
static1
Behavioral task
behavioral1
Sample
a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe
Resource
win7-20240708-en
General
-
Target
a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe
-
Size
3.1MB
-
MD5
c397e978a38f01d85301edc20e042bd0
-
SHA1
94def48ecc1f72941a9d6929ed8e8db71d479951
-
SHA256
a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed
-
SHA512
c94cd2ae2aafe5ec90bbc2eec813f1c2b6da483777832c2f12e357b4838189d257c36d32fb33e34718fd9c911141dde3436366e82cc4c770c6e46ea09cf9d771
-
SSDEEP
49152:uGidlO0Wq0Z+XWsbek3fjtO83pG+Z/ny:+O0Wq0cXWsbek3/2
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3725403a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3725403a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3725403a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3725403a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3725403a82.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3725403a82.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7593128de7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 123596f46a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3725403a82.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7593128de7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7593128de7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 123596f46a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3725403a82.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 123596f46a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3725403a82.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 5 IoCs
pid Process 5012 skotes.exe 5032 7593128de7.exe 3972 123596f46a.exe 4504 fc40b4afc0.exe 5724 3725403a82.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3725403a82.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 7593128de7.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 123596f46a.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3725403a82.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3725403a82.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\123596f46a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004146001\\123596f46a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc40b4afc0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004147001\\fc40b4afc0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3725403a82.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004148001\\3725403a82.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7593128de7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004145001\\7593128de7.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000d000000023b9c-71.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 5012 skotes.exe 5032 7593128de7.exe 3972 123596f46a.exe 5724 3725403a82.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2820 5032 WerFault.exe 98 2736 5032 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc40b4afc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7593128de7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123596f46a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3725403a82.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4508 taskkill.exe 2456 taskkill.exe 5116 taskkill.exe 4052 taskkill.exe 4276 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 5012 skotes.exe 5012 skotes.exe 5032 7593128de7.exe 5032 7593128de7.exe 3972 123596f46a.exe 3972 123596f46a.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 5724 3725403a82.exe 5724 3725403a82.exe 5724 3725403a82.exe 5724 3725403a82.exe 5724 3725403a82.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4508 taskkill.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 4276 taskkill.exe Token: SeDebugPrivilege 4796 firefox.exe Token: SeDebugPrivilege 4796 firefox.exe Token: SeDebugPrivilege 5724 3725403a82.exe Token: SeDebugPrivilege 4796 firefox.exe Token: SeDebugPrivilege 4796 firefox.exe Token: SeDebugPrivilege 4796 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4504 fc40b4afc0.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4504 fc40b4afc0.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4796 firefox.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe 4504 fc40b4afc0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4796 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 736 wrote to memory of 5012 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 87 PID 736 wrote to memory of 5012 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 87 PID 736 wrote to memory of 5012 736 a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe 87 PID 5012 wrote to memory of 5032 5012 skotes.exe 98 PID 5012 wrote to memory of 5032 5012 skotes.exe 98 PID 5012 wrote to memory of 5032 5012 skotes.exe 98 PID 5012 wrote to memory of 3972 5012 skotes.exe 106 PID 5012 wrote to memory of 3972 5012 skotes.exe 106 PID 5012 wrote to memory of 3972 5012 skotes.exe 106 PID 5012 wrote to memory of 4504 5012 skotes.exe 107 PID 5012 wrote to memory of 4504 5012 skotes.exe 107 PID 5012 wrote to memory of 4504 5012 skotes.exe 107 PID 4504 wrote to memory of 4508 4504 fc40b4afc0.exe 108 PID 4504 wrote to memory of 4508 4504 fc40b4afc0.exe 108 PID 4504 wrote to memory of 4508 4504 fc40b4afc0.exe 108 PID 4504 wrote to memory of 2456 4504 fc40b4afc0.exe 110 PID 4504 wrote to memory of 2456 4504 fc40b4afc0.exe 110 PID 4504 wrote to memory of 2456 4504 fc40b4afc0.exe 110 PID 4504 wrote to memory of 5116 4504 fc40b4afc0.exe 112 PID 4504 wrote to memory of 5116 4504 fc40b4afc0.exe 112 PID 4504 wrote to memory of 5116 4504 fc40b4afc0.exe 112 PID 4504 wrote to memory of 4052 4504 fc40b4afc0.exe 114 PID 4504 wrote to memory of 4052 4504 fc40b4afc0.exe 114 PID 4504 wrote to memory of 4052 4504 fc40b4afc0.exe 114 PID 4504 wrote to memory of 4276 4504 fc40b4afc0.exe 116 PID 4504 wrote to memory of 4276 4504 fc40b4afc0.exe 116 PID 4504 wrote to memory of 4276 4504 fc40b4afc0.exe 116 PID 4504 wrote to memory of 2796 4504 fc40b4afc0.exe 118 PID 4504 wrote to memory of 2796 4504 fc40b4afc0.exe 118 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 2796 wrote to memory of 4796 2796 firefox.exe 119 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 PID 4796 wrote to memory of 1084 4796 firefox.exe 120 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe"C:\Users\Admin\AppData\Local\Temp\a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\1004145001\7593128de7.exe"C:\Users\Admin\AppData\Local\Temp\1004145001\7593128de7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5032 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 15004⤵
- Program crash
PID:2820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5032 -s 14804⤵
- Program crash
PID:2736
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004146001\123596f46a.exe"C:\Users\Admin\AppData\Local\Temp\1004146001\123596f46a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3972
-
-
C:\Users\Admin\AppData\Local\Temp\1004147001\fc40b4afc0.exe"C:\Users\Admin\AppData\Local\Temp\1004147001\fc40b4afc0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45342aee-c6d5-4aa5-a036-3b5f46f7327a} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" gpu6⤵PID:1084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a277117c-7611-4df4-ba4e-c35cf8d14524} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" socket6⤵PID:3696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2828 -childID 1 -isForBrowser -prefsHandle 1436 -prefMapHandle 2764 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bb1bd759-5088-4acb-8c35-9f32f90fa0c2} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" tab6⤵PID:3600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3648 -childID 2 -isForBrowser -prefsHandle 3640 -prefMapHandle 2760 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7634b83b-dafc-49b7-b4c9-ccd9a19ce2a3} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" tab6⤵PID:3120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4664 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4624 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf744d7e-ed54-4384-9c17-ae8aa0b336b3} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" utility6⤵
- Checks processor information in registry
PID:5448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 3 -isForBrowser -prefsHandle 5652 -prefMapHandle 5672 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5d279be8-dd24-40f0-ac88-b30cf000c170} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" tab6⤵PID:5212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5176 -childID 4 -isForBrowser -prefsHandle 5836 -prefMapHandle 5844 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {83de3619-5a1d-457d-9314-f438b521a349} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" tab6⤵PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=6004 -childID 5 -isForBrowser -prefsHandle 6084 -prefMapHandle 6080 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ae395fdb-a8fc-4341-8660-ad14449d1f84} 4796 "\\.\pipe\gecko-crash-server-pipe.4796" tab6⤵PID:5236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004148001\3725403a82.exe"C:\Users\Admin\AppData\Local\Temp\1004148001\3725403a82.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5724
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 5032 -ip 50321⤵PID:4276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 5032 -ip 50321⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize18KB
MD59383d27b28a56cb9f4201fee7546c578
SHA1cd17f0130cc71f1f609b0aaa2b216cbdb350dc85
SHA25642540a0fb977dea16bb2dae8a8d46c4405d6b1a4c82295fd6be015c823977990
SHA512e94434214bcdbd80f99440f9baecc4d54f510880cb3c36cace41a64080b84b181a5de3281f2519c9a059cc1c9c7aa2efb52e69cfd1f8b4ba3fc99df23da380c3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5a923267c518fd80c877d2167271955d8
SHA1e3609f84d7d6af744b87cbf7971f257c473bb9da
SHA2567eb6045f1230d3beb9e9f151b46f9f058677a9b990b9f6faeecaddcca85fc35d
SHA512315401b8998559a3fc611f89eafe21e91eb22ae3d4ec7f1be4f92ef02958515fc622e55c07b8e56296c0a3eda759223178a9051a054f2771d9dfba4f18de64cb
-
Filesize
3.0MB
MD5bd02fbc4f962284aa8c9b6f50781ea8a
SHA1105abaa0a053bf102dfbc24dd2d93ef7173d46dd
SHA2562e82cdc1ce6a5b075cf2f50c00b4fdb458daa0351502ef654c3d6bf868b51504
SHA512ca060eb94ef596bc235f3c9bd9e1bfd412a6cdcc8c9f3ed69a2359e9d5059ef7cdb19df11337e791e0a04059b95f5b1f6dc2c133cb521cb30e7e8e9112dc25ef
-
Filesize
2.0MB
MD50625bfb508155bf72c447f0819c545a5
SHA1fb030eced8eb89cb25dbb78712cf38476bb959a0
SHA25642321395d0e8e8706391651a061c178878218698ebc6c1a6e2aaaa0d38c23b2b
SHA512b19347b046267d036c735bb4c60d66611caab634c878f8d6b104738dcd617d22de377f87cd35a1b2a25be42e30a8ba25cbee4b6293d5d048a0291815c7ba7c05
-
Filesize
898KB
MD59bdca68b008c8506e9070aa48676d172
SHA168852a9063ed26d8a19e22d68042585df7b0858b
SHA256a1fef53b423845e83b565d6f2990d458dbceeeab88c083e1078c01ef469335a2
SHA5123d7135f3a3a7ce6c31eddc0b2c89ca9fc2734e7855e8728d8602ac63ef6bfbcdc0489984e940551215eeb6537a04b434ed23c26bc09afcab6d1db614c4b4f835
-
Filesize
2.6MB
MD56d60ee79cbe29830a8f4c2f7541d3e6c
SHA147e98d4e24a51a9ff43b306b34b2f943ff2a4c25
SHA256a9cc4f8bc22bf66ecb50dabe3cfa108728c53b8dda35878ecb98d547454c180a
SHA5123ce4021601ee733110ae1b8c3970ec2355c4b99f004e506c79980a26ffb0d4b20dd10266c306e1033deec5278e8a11f7f38651a98529cd85a24a0919e449341c
-
Filesize
3.1MB
MD5c397e978a38f01d85301edc20e042bd0
SHA194def48ecc1f72941a9d6929ed8e8db71d479951
SHA256a6185bddf317cf27a75ebcf7ed2d7b189aff01603ab693b35e995aef764371ed
SHA512c94cd2ae2aafe5ec90bbc2eec813f1c2b6da483777832c2f12e357b4838189d257c36d32fb33e34718fd9c911141dde3436366e82cc4c770c6e46ea09cf9d771
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize18KB
MD56ece6e5e3d20fd626b965ba658d25a6b
SHA1f8b689eaf5ea6f86af521e0ff5e5a4270bc1b544
SHA25601a03825cca8c8ef5da20accf41d1ba592f2d69c6779083c98aff895f158f840
SHA51251ca454d51f8325207cd1d3cc1f1ee6f479a824f0e77479ac16831768267fc36c611f721a7846a9ec2f8b85c325b0c51e5fab06eaebf955d95ef254c95fbac45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize10KB
MD590fef101eac0d860eeb70d2592e8cb94
SHA112539eb5be0ea05d48dc2ca132d5f984d0f62713
SHA2560f5295223be06c4f13787b3bd3146ed8f73c3dab6716d155b92cd005f78719fb
SHA512450e203fa3474de1ce0b56bc6def9f4e51778edd088366e6106680ae242ddf501abe30d6d5ffb651956165c3fd5bd55407ae79ec78c50df39988dd3623ba77eb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b861bb1d59a2432ff4afa283b817c296
SHA17f9b251aececc99e612607a00f5ef83ef0254067
SHA25621e7d3819e99252091dda38f04720e810163c80eaab2af797c32c311e90b4a2f
SHA512c06d8f0f55364f8d83897b6386c543a9083658fe9f540c79a4cd34611f65294458ce64f065280bb59534f45b7ec79197d7f4e8d2afa7bd079461002d0216f552
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ea7900631838c4285ece6fc967770e75
SHA15854aac7aa5b3b51c25c761c01bff05b259cb4d9
SHA256cfb29e50f5c413d404d6062aab5d11c8738dca9c86c12ded6b3822b15f0d27d9
SHA512394c0d154de578a97207e54a8a3de94f06116950a3d55308c6b022822501bd054950aba472cb105dd85cd8ff80ba0f6d9083d9a48415ae0ebe949b4d3421215c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54cfd53ebfc3856ae175cfef5bc5272aa
SHA1fb9533a7bf588077cef0edf05fd804bded5f5347
SHA256520624ede5ce99960408f3e679c868ed87c0343d40e1f5a52221218cba95cdd1
SHA51248a112700272900f4c98be9237f43fa24ff51124bfa4ae673fbb7490cbeacb72c17d63575f2590fe795e208ff307cc5e90b71f968e063f65d5497499e33d1a57
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\60e0287f-5ef5-4e05-9cd0-d0f23a92ec56
Filesize671B
MD57aa7a0ea1edff4d8a200fa290a4b475b
SHA1c7b54680bedd980a15d0bfa5bb47353ba3391357
SHA25609005b374ebbfb5d23cd8d2fb53f8dad7b829ea3d75d023723d192014af3ca90
SHA51296ca8917f6cc3daa584291c09340ced396e96d43d2c3601c5c351edec6405b40a05a112e891515ae41cbfb36b1c4737bfe5edcb9aba830020f39f0fb1b389a34
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\d5c1627d-773d-4089-bdcf-633014587b0f
Filesize982B
MD50cae395411c28efd8e942e0fd4275cd2
SHA10936643b7595b0a73d343ec0ac9da3f8e62e512f
SHA256690c3de09d6d9d62c335c312ca227ffd3ca1f531f9940238421f8297b5e95ed0
SHA512864b97cf33fb154de2f0397e526e55c6c1fd0600d85afecf6db37337179516d341749f271e34b6ff2cb73657623e7cb4d14dd603022b13e5a23a6b5b418491b4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\f7dcb200-30eb-481c-bd7a-d16dd363730c
Filesize24KB
MD5aa787c4ed4c2bdb8e8d777b927e36c6d
SHA168b55763f80178ec7e034ceb8492f890d05febae
SHA25621c77235da75a1a9242b7bef093e1cbdfe50888ca6053025aac42c3dc404c31c
SHA512f1aecccfdbded02a616916a3eeca308ba5492b64811572f4871a7149b77d3aa96c925d97217419a168d38c3322c9518197101075e8fedb93ea5b202842569c6b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5b7592b0e77ee974f665cfb9c07e180e2
SHA13125e69c96a38dcf87c63895edc77b922a57069a
SHA2567431fbcf19ccaf3e2fadca49bfb047d49a3fdc7f092b756939005e4b4c7b3e18
SHA512d37d03efd5842a7b8d9c05dc29fa779f0aa74b30235bd39df6f490032be8b13591d4da6143f2d004362493dc982b14b821572d95c8d564008f287259a501b518
-
Filesize
15KB
MD585c74657e9d62bfa025cb04a8fe4b347
SHA1e0e550deea7d6747c0569dba08a48b99f409bcc4
SHA256a2db3072e92334c42be89a14de8eb6b58613a974bc62caaa2cc79c2543ec6172
SHA512e4341db8924fbe619bbc81772b0b2769bc98db2d6957717091746bb8f0c9e2e1db033c765efafa355375346ca4e3c40af354de5462e457f1af723f835b8300c8
-
Filesize
10KB
MD5d6cf7c81a644dd57b682b2f512bb446a
SHA1f537cf3003e75caea618e555986d8ded09fc3c6c
SHA2562ab8c490b65f146af82fcbe1e8bd2ce94f2acf617ccaf8c5f45c74e855588ee9
SHA5129f2825b1d06f3f5700633f13ff26d5a819fc8b2fa40c5d12996518b244396c1e97d54efa804564f20c010cfc4272041b8c41fd2700ddd7400002270a3d18d3f5