Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
e788e5dd84c8c180b072cce3c16d329d
-
SHA1
2685fe8dcd081268a54560180232d574d048acd1
-
SHA256
01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547
-
SHA512
6810df6bef6de35897a69187f7c73ab3b4e3c9982b742fbc64b7c81d206ca19ed482f9286c1232527a556a28b9b4d41f0982d942b10fd95a2c6d490a9f4ad96f
-
SSDEEP
24576:xbzBHYF64bhWZSHBUJXJBwTEHFAhDFjglJv+vxunnXPb6ETZf8AzjpE+Nocoazwa:pQ9WZRBwT6+RR6lXPb60HpEsocxwGT
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cf4c1d647b.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cf4c1d647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cf4c1d647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cf4c1d647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cf4c1d647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cf4c1d647b.exe -
Stealc family
-
Xmrig family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5177db054b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 380d85bbb1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf4c1d647b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/2172-174-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-177-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-179-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-178-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-176-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-173-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-180-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-188-0x0000000140000000-0x0000000140848000-memory.dmp xmrig behavioral2/memory/2172-189-0x0000000140000000-0x0000000140848000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2856 powershell.exe 2428 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 380d85bbb1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 380d85bbb1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5177db054b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5177db054b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf4c1d647b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf4c1d647b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 8 IoCs
pid Process 3428 skotes.exe 3420 5177db054b.exe 3304 380d85bbb1.exe 1596 cf4c1d647b.exe 5004 chrome.exe 2440 rfopgxavqojn.exe 4632 skotes.exe 1348 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 5177db054b.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 380d85bbb1.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine cf4c1d647b.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cf4c1d647b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cf4c1d647b.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5177db054b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004423001\\5177db054b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\380d85bbb1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004424001\\380d85bbb1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf4c1d647b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004426001\\cf4c1d647b.exe" skotes.exe -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
pid Process 4608 powercfg.exe 4684 powercfg.exe 1064 powercfg.exe 4176 powercfg.exe 5024 powercfg.exe 2444 powercfg.exe 3816 powercfg.exe 4168 powercfg.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log powershell.exe File opened for modification C:\Windows\system32\MRT.exe rfopgxavqojn.exe File opened for modification C:\Windows\system32\MRT.exe chrome.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1244 file.exe 3428 skotes.exe 3420 5177db054b.exe 3304 380d85bbb1.exe 1596 cf4c1d647b.exe 4632 skotes.exe 1348 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2440 set thread context of 3664 2440 rfopgxavqojn.exe 164 PID 2440 set thread context of 2172 2440 rfopgxavqojn.exe 166 -
resource yara_rule behavioral2/memory/2172-168-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-172-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-174-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-177-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-179-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-178-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-176-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-173-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-171-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-170-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-169-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-180-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-188-0x0000000140000000-0x0000000140848000-memory.dmp upx behavioral2/memory/2172-189-0x0000000140000000-0x0000000140848000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2360 sc.exe 4980 sc.exe 2248 sc.exe 408 sc.exe 2700 sc.exe 2136 sc.exe 4204 sc.exe 2408 sc.exe 3572 sc.exe 2884 sc.exe 4924 sc.exe 4956 sc.exe 3204 sc.exe 4036 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1904 3420 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf4c1d647b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5177db054b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 380d85bbb1.exe -
Modifies data under HKEY_USERS 50 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\ROOT notepad.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1244 file.exe 1244 file.exe 3428 skotes.exe 3428 skotes.exe 3420 5177db054b.exe 3420 5177db054b.exe 3304 380d85bbb1.exe 3304 380d85bbb1.exe 1596 cf4c1d647b.exe 1596 cf4c1d647b.exe 1596 cf4c1d647b.exe 1596 cf4c1d647b.exe 5004 chrome.exe 2856 powershell.exe 2856 powershell.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 5004 chrome.exe 2440 rfopgxavqojn.exe 2428 powershell.exe 2428 powershell.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2440 rfopgxavqojn.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 4632 skotes.exe 4632 skotes.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe 2172 notepad.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 1596 cf4c1d647b.exe Token: SeDebugPrivilege 2856 powershell.exe Token: SeDebugPrivilege 5004 chrome.exe Token: SeShutdownPrivilege 4608 powercfg.exe Token: SeCreatePagefilePrivilege 4608 powercfg.exe Token: SeShutdownPrivilege 4168 powercfg.exe Token: SeCreatePagefilePrivilege 4168 powercfg.exe Token: SeShutdownPrivilege 1064 powercfg.exe Token: SeCreatePagefilePrivilege 1064 powercfg.exe Token: SeShutdownPrivilege 4684 powercfg.exe Token: SeCreatePagefilePrivilege 4684 powercfg.exe Token: SeDebugPrivilege 2428 powershell.exe Token: SeDebugPrivilege 2440 rfopgxavqojn.exe Token: SeShutdownPrivilege 4176 powercfg.exe Token: SeCreatePagefilePrivilege 4176 powercfg.exe Token: SeLockMemoryPrivilege 2172 notepad.exe Token: SeShutdownPrivilege 5024 powercfg.exe Token: SeCreatePagefilePrivilege 5024 powercfg.exe Token: SeShutdownPrivilege 3816 powercfg.exe Token: SeCreatePagefilePrivilege 3816 powercfg.exe Token: SeShutdownPrivilege 2444 powercfg.exe Token: SeCreatePagefilePrivilege 2444 powercfg.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1244 file.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 1244 wrote to memory of 3428 1244 file.exe 86 PID 1244 wrote to memory of 3428 1244 file.exe 86 PID 1244 wrote to memory of 3428 1244 file.exe 86 PID 3428 wrote to memory of 3420 3428 skotes.exe 96 PID 3428 wrote to memory of 3420 3428 skotes.exe 96 PID 3428 wrote to memory of 3420 3428 skotes.exe 96 PID 3428 wrote to memory of 3304 3428 skotes.exe 106 PID 3428 wrote to memory of 3304 3428 skotes.exe 106 PID 3428 wrote to memory of 3304 3428 skotes.exe 106 PID 3428 wrote to memory of 2744 3428 skotes.exe 107 PID 3428 wrote to memory of 2744 3428 skotes.exe 107 PID 3428 wrote to memory of 2744 3428 skotes.exe 107 PID 3428 wrote to memory of 1596 3428 skotes.exe 108 PID 3428 wrote to memory of 1596 3428 skotes.exe 108 PID 3428 wrote to memory of 1596 3428 skotes.exe 108 PID 3428 wrote to memory of 5004 3428 skotes.exe 109 PID 3428 wrote to memory of 5004 3428 skotes.exe 109 PID 928 wrote to memory of 4360 928 cmd.exe 120 PID 928 wrote to memory of 4360 928 cmd.exe 120 PID 2216 wrote to memory of 1900 2216 cmd.exe 151 PID 2216 wrote to memory of 1900 2216 cmd.exe 151 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 3664 2440 rfopgxavqojn.exe 164 PID 2440 wrote to memory of 2172 2440 rfopgxavqojn.exe 166 PID 2440 wrote to memory of 2172 2440 rfopgxavqojn.exe 166 PID 2440 wrote to memory of 2172 2440 rfopgxavqojn.exe 166 PID 2440 wrote to memory of 2172 2440 rfopgxavqojn.exe 166 PID 2440 wrote to memory of 2172 2440 rfopgxavqojn.exe 166
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\1004423001\5177db054b.exe"C:\Users\Admin\AppData\Local\Temp\1004423001\5177db054b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3420 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3420 -s 14804⤵
- Program crash
PID:1904
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004424001\380d85bbb1.exe"C:\Users\Admin\AppData\Local\Temp\1004424001\380d85bbb1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3304
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\1004426001\cf4c1d647b.exe"C:\Users\Admin\AppData\Local\Temp\1004426001\cf4c1d647b.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1596
-
-
C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe"C:\Users\Admin\AppData\Local\Temp\1004427001\chrome.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart4⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart5⤵PID:4360
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc4⤵
- Launches sc.exe
PID:2360
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc4⤵
- Launches sc.exe
PID:4980
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv4⤵
- Launches sc.exe
PID:408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits4⤵
- Launches sc.exe
PID:2408
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc4⤵
- Launches sc.exe
PID:3572
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4168
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4608
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "GDRQRNRG"4⤵
- Launches sc.exe
PID:2700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "GDRQRNRG" binpath= "C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe" start= "auto"4⤵
- Launches sc.exe
PID:2884
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:4956
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "GDRQRNRG"4⤵
- Launches sc.exe
PID:4924
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3420 -ip 34201⤵PID:2808
-
C:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exeC:\ProgramData\xrvqzpvhzdcy\rfopgxavqojn.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:1900
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:3204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:2136
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:4036
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:4204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:2248
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:4176
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
- Suspicious use of AdjustPrivilegeToken
PID:3816
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3664
-
-
C:\Windows\system32\notepad.exenotepad.exe2⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2172
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1348
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Impair Defenses
3Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD508e058cf084f3844eaf16768b8d0fee6
SHA1e3234cfd97054c5d59d669631415da44f2643958
SHA256309dd4a3446c087863dbaa7c5712e884bbc73bc20df663aac8d2aafb6b92278a
SHA512912d29c9c8389bf3895a4766d24cebf100167efbebdbd27dc09e8099b027e02bcd00506490d426ac627e97ea0704eb0dc94d0c858318fb8f5bda1b2a184a8c95
-
Filesize
2.0MB
MD515cbd9b38ee0965dd301e40b1febe423
SHA1fa6fb0fe1ab51063ad15c4cc36d7f2988622bffd
SHA256fd23f8fa45a5d50250de890fcb6fbfa841c929e19936dc0eaacaca1c6f3f3a2e
SHA51281a15df2bf1002092fc7ac6aec533a4c7ca2f6bde8bb29fdd027ba2db4d73760e4547bb72f0cf2d9440974759fb515bf06be3c1a7cf8f52c63008ebc0b49c19e
-
Filesize
2.7MB
MD5bc08cdfa0f7e0ff8ce4ce2b6e34d2cf0
SHA142c3e1f582916dd1b7472d0608a69ba027089790
SHA256bb8a90f875cf35b9bf9ffb88fe4cce38531a87303aeb96baf1dce2d2d8e52c89
SHA512883bbf0b0f31b8866cea28c1d1aa382cf4426bcb4caf2f94302cfed5e95f190254585dc126d57440fead81928bce6d7b9d4db0a1c33e190b3414a2c62e3d6d67
-
Filesize
5.0MB
MD5d0fc461b72469a7863f1cfc160289437
SHA1a4995f29d631ac92748b4171c1f985709e36f0bc
SHA256f038f6caf4194e8382830057a069646a213fd2d3bd30855d7ae59c052019bb25
SHA512e138b7b329f4c779e90bfe1447395bcaeac1dcdd97849576ab8dd51baaad45050b400442964fc66efabf125be3cd41e14a2aaeda7477e95482aa13dcaf01e80e
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.0MB
MD5e788e5dd84c8c180b072cce3c16d329d
SHA12685fe8dcd081268a54560180232d574d048acd1
SHA25601022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547
SHA5126810df6bef6de35897a69187f7c73ab3b4e3c9982b742fbc64b7c81d206ca19ed482f9286c1232527a556a28b9b4d41f0982d942b10fd95a2c6d490a9f4ad96f