Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 05:49
Static task
static1
General
-
Target
b2137b2d52e9e112a93f9de6b426c61e.exe
-
Size
6.0MB
-
MD5
b2137b2d52e9e112a93f9de6b426c61e
-
SHA1
a850404663170a5ddb9f87bc659140ca93e1a0f1
-
SHA256
fd1fd5578c1d6f55d8b5da615b40ec390ebc97c10d841af1e69a5bea978c6d7b
-
SHA512
21ade888148b930990e0d4754bd867bad8f9bf5d9bb785bb97b18cd0e84003e1cfc5ec631f959ba0408fe14e85ea36151b516b3e15b42017dcf004e070f6ed94
-
SSDEEP
98304:udsNzgXsP1JQZGkGE6mSOAsiK+e8ftrLtL5WpEWLRQkbx4OtgTVXDraXZw7bYYfN:uuNzNkGqTiK+L1d5W6WLRQO4O0Vzu27L
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1Q31F2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2M9591.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3z03e.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2M9591.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3z03e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3z03e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2M9591.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1Q31F2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1Q31F2.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1Q31F2.exe -
Executes dropped EXE 9 IoCs
pid Process 4272 l0z50.exe 3984 C2Q22.exe 3036 1Q31F2.exe 4632 skotes.exe 1540 2M9591.exe 2040 3z03e.exe 4556 4w793H.exe 6856 skotes.exe 4092 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2M9591.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3z03e.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1Q31F2.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" l0z50.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C2Q22.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b2137b2d52e9e112a93f9de6b426c61e.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000023cca-47.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3036 1Q31F2.exe 1540 2M9591.exe 4632 skotes.exe 2040 3z03e.exe 6856 skotes.exe 4092 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1Q31F2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2168 1540 WerFault.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C2Q22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3z03e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4w793H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2137b2d52e9e112a93f9de6b426c61e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l0z50.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1Q31F2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2M9591.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 616 taskkill.exe 4812 taskkill.exe 1832 taskkill.exe 5088 taskkill.exe 2600 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3036 1Q31F2.exe 3036 1Q31F2.exe 1540 2M9591.exe 1540 2M9591.exe 4632 skotes.exe 4632 skotes.exe 2040 3z03e.exe 2040 3z03e.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 6856 skotes.exe 6856 skotes.exe 4092 skotes.exe 4092 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 616 taskkill.exe Token: SeDebugPrivilege 4812 taskkill.exe Token: SeDebugPrivilege 1832 taskkill.exe Token: SeDebugPrivilege 5088 taskkill.exe Token: SeDebugPrivilege 2600 taskkill.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe Token: SeDebugPrivilege 3836 firefox.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 3036 1Q31F2.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 4556 4w793H.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 4556 4w793H.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 3836 firefox.exe 4556 4w793H.exe 4556 4w793H.exe 4556 4w793H.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3836 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 4272 1400 b2137b2d52e9e112a93f9de6b426c61e.exe 84 PID 1400 wrote to memory of 4272 1400 b2137b2d52e9e112a93f9de6b426c61e.exe 84 PID 1400 wrote to memory of 4272 1400 b2137b2d52e9e112a93f9de6b426c61e.exe 84 PID 4272 wrote to memory of 3984 4272 l0z50.exe 85 PID 4272 wrote to memory of 3984 4272 l0z50.exe 85 PID 4272 wrote to memory of 3984 4272 l0z50.exe 85 PID 3984 wrote to memory of 3036 3984 C2Q22.exe 88 PID 3984 wrote to memory of 3036 3984 C2Q22.exe 88 PID 3984 wrote to memory of 3036 3984 C2Q22.exe 88 PID 3036 wrote to memory of 4632 3036 1Q31F2.exe 90 PID 3036 wrote to memory of 4632 3036 1Q31F2.exe 90 PID 3036 wrote to memory of 4632 3036 1Q31F2.exe 90 PID 3984 wrote to memory of 1540 3984 C2Q22.exe 91 PID 3984 wrote to memory of 1540 3984 C2Q22.exe 91 PID 3984 wrote to memory of 1540 3984 C2Q22.exe 91 PID 4272 wrote to memory of 2040 4272 l0z50.exe 99 PID 4272 wrote to memory of 2040 4272 l0z50.exe 99 PID 4272 wrote to memory of 2040 4272 l0z50.exe 99 PID 1400 wrote to memory of 4556 1400 b2137b2d52e9e112a93f9de6b426c61e.exe 102 PID 1400 wrote to memory of 4556 1400 b2137b2d52e9e112a93f9de6b426c61e.exe 102 PID 1400 wrote to memory of 4556 1400 b2137b2d52e9e112a93f9de6b426c61e.exe 102 PID 4556 wrote to memory of 616 4556 4w793H.exe 103 PID 4556 wrote to memory of 616 4556 4w793H.exe 103 PID 4556 wrote to memory of 616 4556 4w793H.exe 103 PID 4556 wrote to memory of 4812 4556 4w793H.exe 109 PID 4556 wrote to memory of 4812 4556 4w793H.exe 109 PID 4556 wrote to memory of 4812 4556 4w793H.exe 109 PID 4556 wrote to memory of 1832 4556 4w793H.exe 111 PID 4556 wrote to memory of 1832 4556 4w793H.exe 111 PID 4556 wrote to memory of 1832 4556 4w793H.exe 111 PID 4556 wrote to memory of 5088 4556 4w793H.exe 113 PID 4556 wrote to memory of 5088 4556 4w793H.exe 113 PID 4556 wrote to memory of 5088 4556 4w793H.exe 113 PID 4556 wrote to memory of 2600 4556 4w793H.exe 115 PID 4556 wrote to memory of 2600 4556 4w793H.exe 115 PID 4556 wrote to memory of 2600 4556 4w793H.exe 115 PID 4556 wrote to memory of 3704 4556 4w793H.exe 117 PID 4556 wrote to memory of 3704 4556 4w793H.exe 117 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3704 wrote to memory of 3836 3704 firefox.exe 118 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 PID 3836 wrote to memory of 2904 3836 firefox.exe 119 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2137b2d52e9e112a93f9de6b426c61e.exe"C:\Users\Admin\AppData\Local\Temp\b2137b2d52e9e112a93f9de6b426c61e.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l0z50.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l0z50.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C2Q22.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C2Q22.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q31F2.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1Q31F2.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2M9591.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2M9591.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1540 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1540 -s 15925⤵
- Program crash
PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z03e.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3z03e.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w793H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4w793H.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T3⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking3⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking4⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2072 -parentBuildID 20240401114208 -prefsHandle 1980 -prefMapHandle 1972 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7c4e38e-4e8d-4d44-8bce-4a9482fab03e} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" gpu5⤵PID:2904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2508 -parentBuildID 20240401114208 -prefsHandle 2500 -prefMapHandle 2496 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cbd309ee-fa8c-462b-89c5-9dc211f161aa} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" socket5⤵PID:1164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2964 -childID 1 -isForBrowser -prefsHandle 3344 -prefMapHandle 3272 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c165a55-3766-456f-8159-ae585cdd1e33} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab5⤵PID:2272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3548 -childID 2 -isForBrowser -prefsHandle 3680 -prefMapHandle 3676 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb5f45bd-eb39-4388-a8fc-2bbe6623ecd4} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab5⤵PID:4864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4540 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4556 -prefMapHandle 4552 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9629bf4-b01c-41fa-a6b9-dc3af10900c7} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" utility5⤵
- Checks processor information in registry
PID:5672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 3 -isForBrowser -prefsHandle 5352 -prefMapHandle 5348 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43d52b16-7c21-43d0-a47f-3c61727b8ad4} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab5⤵PID:4784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5492 -childID 4 -isForBrowser -prefsHandle 5500 -prefMapHandle 5504 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {60810c9a-bc99-4dd9-a753-1bf4e45e3355} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab5⤵PID:620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5696 -prefMapHandle 5700 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 948 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1282015f-eaba-4ab4-90aa-1c042fe71c88} 3836 "\\.\pipe\gecko-crash-server-pipe.3836" tab5⤵PID:2604
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1540 -ip 15401⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6856
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json
Filesize24KB
MD58d9e12e4ac659a4de1cd1c18217db377
SHA1de9764837deea745ab773ac7382c5aec9d583405
SHA25681c407246362206a07ad66bab7a72fe09f4642870546292397b47fff2ad063b0
SHA51256c8a72068f54e93feaa2e83609adc584adfebcd089dba2d2d3618d4305d8409509bd9cf342c61a963402491970ffa406e01c2507ef728e186398d8b0218f03f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\D500AD994A7515157BB2A6ADD5B18B754E4D2F99
Filesize13KB
MD5071f2b607467540845181b4976b2d0be
SHA15ab359093dd6ab653110c2e89ee421679cada444
SHA2567836b04024ec0378ee4253fd4b5218d1b15959dc0c144d349dea4827c7c19472
SHA512b70117087002b155c4a08fe45d4e647630423407ae2381f4174150633599bb4f57af5f946928de0c736f5149cb640950db1b3bd9ff10013d42ae44c3ae90d1e9
-
Filesize
898KB
MD508111d2d8d7f25fbf947d406771fe59f
SHA1c9c363df9134252fbde33782915ee1342802e01e
SHA2562a7a6e3bbbc5868b53422fda12c0df49406e389b7aab9ef7a6224eb4d3481dd8
SHA512fc3a7d5a5b5ae7048a85e5703228fb694b6ce307a73b82f2d980dc9c0de1bcccb0aab00346869508c777877565a6b30bbea5d525570228cad2b0a9eae99e7a24
-
Filesize
5.5MB
MD5464ad96e5e3a963ea4553ecb16ce1292
SHA11ea198ef6814d89c963dd44ce981c5682a69e83e
SHA256213c8ccb7364053ee4006958138adb83f297fda8943b10891d450afa88784367
SHA5124a36ebb25007f9430fbf08b7a39534963122912fe0cd0d31806bf634eb3a01ae9a103c12e86e78b86d9b481e01cf33c53780258a437d81414937b82be4c7018d
-
Filesize
2.0MB
MD5d488e0b4b23af8f848a6708747d7b266
SHA10d502db8350e5b92787c523db125bcbbeb1495a7
SHA256073df3ae205c8e564ce589b7a590cb5ff00ceed9eb984354a559355ae24cee5f
SHA512429e688a8c7cf0762573da76527aea5934acd7c6f42f065cc8271e76d3264d281a694f87054d56f8dbf7de25ec5db0f64d73c0d76b47cb6a5f8d8fb0598a6e83
-
Filesize
3.4MB
MD53028160a6a87d55d943654f46441cb8e
SHA167e5a58fa1b709666560f17688a08907a68c5cef
SHA256e72d90a6be2c9b2a510d0bc2bf7386123bf3614f73ea8a25d2354f2d02fe3b2f
SHA51236d7db2e266ad741d25ce2f1fc48aaab08c0dc577ad6d0fef587b1632c63f76e44d17dcd1ece61ec31c04b0ca56ba3fea486b0e1198ccfbf665054678d8fca8d
-
Filesize
3.1MB
MD52ee21f95f5937ba3632ecc66cbe38950
SHA14399c7c028f1645d73b6f093a66601c9a7cc250c
SHA25652fc45fd55742c77e3ef6daff7795c695e65932e2f6513fc62b88e3bcaaa8e36
SHA512aa952eea8bcfb891940a387cee2e0fd99529de327f976e4cd71b7c21c0007a5a7b8c03481c07daefe73db6eec5d0e76a60171c6e7d760507f87e5e5470fb2cd2
-
Filesize
3.1MB
MD53f6d1165cf4934fcb43b26fca5e2e572
SHA1f94a4ec1d90bb7324c9adc59db7b2222b83926a8
SHA2566183ca1822879dc24791fbc1424c81c112ba6032e9dffadab730f25b3b0dd707
SHA512d9ad72e02d35d79becd2ddb34bbdc58946cc42a74c6789286054f07d013ffd3c8e61403f10f790842630a3e7735d0268b9002d77087481c92458a665589e0970
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD54b104ba5b1392f43ba42333adc41634e
SHA1866365c82219e67e5aebc03cd0d7101fecabb71f
SHA25696a18f4c97b5945f48a7ebad10e2682aa7d971cbe601baedfa1d50b5cd0a4a46
SHA512cc66dc387e8f1d1f1afc3185df3327f83b23cea2481b9b1586be707eec0262b7def605456bcfd549799eb2f6a83a8e4688d4f71c53a45cb99e310f14398f5688
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize11KB
MD51b0657b8a327b86654bc120efb1b3599
SHA1117f13c63237d62c18a2bca637f59fcf7d058c56
SHA256594a3c16718639bc6f32a7e0487966020a4f0db98da0bb012c1763399d263f77
SHA5120a8b306fd836f6a02178871105d50fc3be7908063e960330274bd54d84042dbcb56a5e237dff1bdcb2d98ff9caa413a4587372edd90115bc9f6aae01319c6b3b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD50dd6c110958b5727294df878789ec8ec
SHA1507ee3f6139bdcb10e3b873aee05eab01f5f051d
SHA25652e777845353c716e389e55b464a551ee442d152b105ff2942f46911842bfbe3
SHA512f3c90e58268078bab3040ebfa64fcabdb29b623692a81adef30520c2f26c09d433e68b0b37327779b1b34d5c0e289341d5a35150297074351e6e8d029ec3aea4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.bin
Filesize14KB
MD5e1543ea01c57fe56dd83351440b0e7b4
SHA12a0843849939efbe783e3b7b5ca0ac04511d4667
SHA2565257a6ae79152dd26c7ab009579867cdbd8be1c08d7ec6d4fcaabe36499b1675
SHA5128e864619f6aed70b518b9ff53537b22bcbff1dd4afe27096e9e628e7693bf62804e4d8d22fa2c7b5d1f2082ceb873236092fe1e9db3f6352feaf8824ba92f1bb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5494b5276b2f4065d72813551114e242c
SHA1f33d1f3e7e3e3bb95a80ffa3a544a3bd93a31fb6
SHA256a91d8371dce33d8a76c61c5612cf2bd7940efcdd7eb77b9d660734e6038f0c96
SHA512e83e2107e113c4439507bbe99c84605f4156313e6f89054d9cb848a453043f3ced554c527680385f4bf2ee805a820c9a450f48f9b19759c10c34a44abacf3c1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize14KB
MD5c58c5cc002c8c8fb5b9983f7986ccd1c
SHA1ee389cb75147c3a5a54aa147ed94eaaa67b8b73c
SHA2567f8c18dae35dac5e7c7854d62a3c9a789b46b2e58f5fb7094145ff86748d5570
SHA5120c30e9408345edff23ce7c531d6159c59a8c73ba7b049d1c77cae9284496604204085b5a5a5fd17635f7f161f6f03985eeb973e5eee3bff1082a6534cebea464
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\5a3b2d6a-8bfc-43b6-9d40-d61f3ad22f03
Filesize982B
MD5d4cb489ea1978511545523dcd6a84dc3
SHA1dff6c20c88e3b088b45be65e0b08d9d73eab2622
SHA256b2a152a908346b1b50514570384a7e1d3285279835aa45f639b2ab19548bc863
SHA5127bea64493dee8f99a15a12e3112d8e4b01c992ea59ae2300bf82ebe28b93e6534d501a4161f05925171be5da275c6c9aa757e0349bbdd349c5102acf7f048478
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\962e01e4-08c6-415a-9f7e-9793111192d4
Filesize25KB
MD52a258217df29f23751dfa587b1a6b763
SHA124eb74ab844a66c59edbd5f834915a9bb13dc15d
SHA2562ceb9af8a1e4188d37433e4fd1911dede6139c2f2c262b477651772ee66fbe58
SHA5121292c7c35fbc0c2a8bfcf2247496504368cf01729f8696b571e8d15d0b31933434b140e5002cf91619e685f98e5c80766bb2ac45495b2b89e934295790987ff6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\a891bf2b-afaa-429a-9885-f0118db1c7cf
Filesize671B
MD5dd851100342b8aa9f20251d619e50434
SHA176cc3060355d3a0a02df6663d22103f44a3ce5d8
SHA2564f84f339055acc8cbd137a228b1df3ed5506532c85b560aa37ec4592d00f232d
SHA51273fcea8b6afc8a55c3d4664880e45eb444b7e9d967ade47581d07216f9d8345c5f2866fee504335e9f3ea57776c9d15c67eea791ef1b621563d57f80b7af9eb4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5e8e41cc9b4f61b34ff95fa02588bfef8
SHA1201c8fea518646b3a0e80fbee881df118ec4c6f6
SHA2560158a2a68ef9bb3410fb73be7462a10ffd1587182f93b0e140d3fae02f51e50d
SHA51235c9528f4e19fe36626791a8fab212bd700d46eb67354dd047272c2a707b6a5725e517ac395b1e889c8c8b68b1026b1e31428e786b3e5c80755773d71594cf40
-
Filesize
12KB
MD5363ccecd690f0ff2e04088ba57fb7cd4
SHA141969f3c8e62bf6153dd3ceafabcfb0d1a31731f
SHA256d8fb324eda748a5097242498ce5ed69a6ff00c07c208d757fa1075e9e0454b58
SHA512deaae0c73082113227f2fb99830f4afd1a541f968c2c9762ae22231b0c389ded80a65b12d5805d291d67f2568b7b77133ae08ae9fcd893605fa5127879129a41
-
Filesize
15KB
MD5406c46c7ab33b46d19a15cef4742f73a
SHA1617a5c81f8719ba8a31a9303a1e17055421b4315
SHA256665fa7c79e72da77d612b00b4be2b295b2b8f10d820fcfc6b98a218a2fc5be10
SHA512af47bd0185d39f9d52a06fda72596d1ffc53ea2575d2ae0bb3a8a3dce9632b4f6d1d2acb91793bc5f2d06c0ed5e789534bb0c3f197b35ca760ceda76fc315ccf
-
Filesize
11KB
MD5cafcb330b8ab34b37c624683bc79693e
SHA113529108516851af9a8ca4b253c4e6938040d7d2
SHA256153400bc68b092e3636341a6382b750202507d22d1ce883a8ece46f1e9034cd9
SHA512bbd64a31bab715439811aad7419c00a967f6cc9d9a9b0ebb4b286a555f846fa816e83454ad1635363e17758b953d51c35ca7de52f56428e8184d1db6ef556855
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize728KB
MD582581aad65e2b1bc02e70c2a1d93722a
SHA1a54cbc5dbe066b698bd821812470f9fd2c62e902
SHA256e11eaeb5ac1e427d0eb2b7de69ce94b37ba07b311bd9e8a3b5c9f42597dfd810
SHA5127e48c99dbeffe4064a292ecfb77486c84d00d592961755e2cfea4cebd43924aecae8d3720273ad3611186ca8206ec2d14faaf6df8e4b6b3fe16974a5d708e66a