Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-11-2024 02:01
Static task
static1
Behavioral task
behavioral1
Sample
01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe
Resource
win7-20240903-en
General
-
Target
01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe
-
Size
3.0MB
-
MD5
e788e5dd84c8c180b072cce3c16d329d
-
SHA1
2685fe8dcd081268a54560180232d574d048acd1
-
SHA256
01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547
-
SHA512
6810df6bef6de35897a69187f7c73ab3b4e3c9982b742fbc64b7c81d206ca19ed482f9286c1232527a556a28b9b4d41f0982d942b10fd95a2c6d490a9f4ad96f
-
SSDEEP
24576:xbzBHYF64bhWZSHBUJXJBwTEHFAhDFjglJv+vxunnXPb6ETZf8AzjpE+Nocoazwa:pQ9WZRBwT6+RR6lXPb60HpEsocxwGT
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
remcos
DPDNOW
dpdnow.duckdns.org:8452
-
audio_folder
MicRecords
-
audio_path
ApplicationPath
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-A34JIZ
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2a8339c3dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2a8339c3dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2a8339c3dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2a8339c3dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2a8339c3dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2a8339c3dc.exe -
Remcos family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 10 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a8339c3dc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ remcos_a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e0ba677a4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ remcos.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 433d9ac964.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 433d9ac964.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a8339c3dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion remcos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a8339c3dc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion remcos_a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion remcos_a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion remcos.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e0ba677a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 433d9ac964.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e0ba677a4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation remcos_a.exe -
Executes dropped EXE 9 IoCs
pid Process 1300 skotes.exe 3544 remcos_a.exe 4800 remcos.exe 460 3e0ba677a4.exe 4448 433d9ac964.exe 4984 skotes.exe 212 2a8339c3dc.exe 4400 skotes.exe 2324 skotes.exe -
Identifies Wine through registry keys 2 TTPs 10 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3e0ba677a4.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 433d9ac964.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine remcos_a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine remcos.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2a8339c3dc.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2a8339c3dc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2a8339c3dc.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3e0ba677a4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004500001\\3e0ba677a4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\433d9ac964.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004501001\\433d9ac964.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2a8339c3dc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004503001\\2a8339c3dc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos_a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-A34JIZ = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos_a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe 1300 skotes.exe 3544 remcos_a.exe 4800 remcos.exe 460 3e0ba677a4.exe 4448 433d9ac964.exe 4984 skotes.exe 212 2a8339c3dc.exe 4400 skotes.exe 2324 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1300 set thread context of 4984 1300 skotes.exe 112 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 4972 460 WerFault.exe 103 1848 460 WerFault.exe 103 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos_a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e0ba677a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 433d9ac964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a8339c3dc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe 1300 skotes.exe 1300 skotes.exe 3544 remcos_a.exe 3544 remcos_a.exe 4800 remcos.exe 4800 remcos.exe 460 3e0ba677a4.exe 460 3e0ba677a4.exe 4448 433d9ac964.exe 4448 433d9ac964.exe 4984 skotes.exe 4984 skotes.exe 212 2a8339c3dc.exe 212 2a8339c3dc.exe 212 2a8339c3dc.exe 212 2a8339c3dc.exe 212 2a8339c3dc.exe 4400 skotes.exe 4400 skotes.exe 2324 skotes.exe 2324 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 212 2a8339c3dc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4800 remcos.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 5056 wrote to memory of 1300 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe 86 PID 5056 wrote to memory of 1300 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe 86 PID 5056 wrote to memory of 1300 5056 01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe 86 PID 1300 wrote to memory of 3544 1300 skotes.exe 97 PID 1300 wrote to memory of 3544 1300 skotes.exe 97 PID 1300 wrote to memory of 3544 1300 skotes.exe 97 PID 3544 wrote to memory of 4800 3544 remcos_a.exe 98 PID 3544 wrote to memory of 4800 3544 remcos_a.exe 98 PID 3544 wrote to memory of 4800 3544 remcos_a.exe 98 PID 1300 wrote to memory of 460 1300 skotes.exe 103 PID 1300 wrote to memory of 460 1300 skotes.exe 103 PID 1300 wrote to memory of 460 1300 skotes.exe 103 PID 1300 wrote to memory of 4448 1300 skotes.exe 111 PID 1300 wrote to memory of 4448 1300 skotes.exe 111 PID 1300 wrote to memory of 4448 1300 skotes.exe 111 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 4984 1300 skotes.exe 112 PID 1300 wrote to memory of 212 1300 skotes.exe 113 PID 1300 wrote to memory of 212 1300 skotes.exe 113 PID 1300 wrote to memory of 212 1300 skotes.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe"C:\Users\Admin\AppData\Local\Temp\01022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\1004494001\remcos_a.exe"C:\Users\Admin\AppData\Local\Temp\1004494001\remcos_a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004500001\3e0ba677a4.exe"C:\Users\Admin\AppData\Local\Temp\1004500001\3e0ba677a4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:460 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 14684⤵
- Program crash
PID:4972
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 460 -s 14844⤵
- Program crash
PID:1848
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004501001\433d9ac964.exe"C:\Users\Admin\AppData\Local\Temp\1004501001\433d9ac964.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
-
C:\Users\Admin\AppData\Local\Temp\1004503001\2a8339c3dc.exe"C:\Users\Admin\AppData\Local\Temp\1004503001\2a8339c3dc.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:212
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 460 -ip 4601⤵PID:1128
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 460 -ip 4601⤵PID:3808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5cadd15985d0c9dea6ce57c429ef7bc44
SHA14997969c518cce9fe4d8ff7c8cf2842badf72eab
SHA25664253ff18d2d354aa4be0ab5b53da32f86b79a42f174b1142c2a6dbefb2a7ee2
SHA512ac2d013d1172249c87acb6d8997ead807f300896bd77a6ce16507ff4370900298cee52408416a00cc66c80d7f3f989f9188bb6e5aaa005cef98be62dad5da7c8
-
Filesize
1.9MB
MD5b85c47881ba0eb0b556b83827f8e75c8
SHA1dccdf0daee468f9e9bed3edf928f0839d26b47cb
SHA2569d577624acca69f5b4097a6882e934b026a344757cf5cf31f3341e643ed2ba20
SHA512ca158aff36e4eeff5d1c263a79972dfa0aa7584132f12a3d301a5cc5c47b57309fe71b4837c7b8caa5022cb18529b565d6a0849acdabd1af939b76b48284a605
-
Filesize
3.0MB
MD58cf8b11e1553e2381b0c2376d013e951
SHA133d8bc52fe1fc709ee086a5a84d39024b6e2db92
SHA256d3ea3d360b4e4c6bc1da5adbd8c8bbe689b0541166e2a77dac821517be81de98
SHA512a876d770734998f8397efea36c94bf7b61d14aa317f4b9e62b95333171068b626ebe2336c6fefc3a0f02f16b454df5c852b9fe4cbb3af59fe1d11ae2f77303a4
-
Filesize
2.0MB
MD55c656fca21313b706060727ffe93f6bb
SHA1481b192814532355b6e2045091ee300f307349e8
SHA256bfcf6c46d64eb87be63df45a15ff9c2a89bd66af62942756ec4dbd45cdfe6ebd
SHA512a7035a9bfb230ed1621dfabcfa43ee07b62e95b82858f2cac1bdaba16c5654574f5af0f445082d5ba6695bc5734a8e0d99d05a810ba27344ec0fe709e20cd589
-
Filesize
2.7MB
MD56ae0b7949bfe36ae9e0f6fefa371c05c
SHA17094338f84ab379fb1b1312835d57580247f3d60
SHA2569cfb562cc0ed667b52264085f6b78f39fd1bc5c0336806070b63af19d52d80f3
SHA512c10026e4502e918735acc80905075864d36ebc0edaecfef95a5081b4d2d2808c1c18176656503263a17506be02997b05390f71c825097bc79ec9f7de26fd91b2
-
Filesize
4KB
MD54063af59c53246cf54bb6ae6de1c12ef
SHA1b00c2cb351fe7dfd31862d88bba63d6a8ee34a53
SHA256fb3572d8335622baca4e609d6562089771fc2eb17456fb480ef8cb99a4e7fe8d
SHA512f22fbdbf3b6cf11988d6e928e4474be516ca817ae969aa6b8244db79b615fb39b7385251ee640f7e70783e3159ca42228ea6a94446631f346c9370e7c1e8bfe3
-
Filesize
4KB
MD530a4224a9a1bbb1520a256481412d2bc
SHA1ffb8a21c6d65737e34508480ed16158ea8051bbd
SHA256a47d5958ee40814d03e15a4cacf6525d59dea5fac8b53b08058fc67ecf6b61e5
SHA5125f6aa83ec24147422458241e596768e686ad4172be789514b4567c0bb4c15f8bca2722f4019bcfe0299ebf2adc5f9ffcb31b7d8b7b2fd86209b8a0cb128271de
-
Filesize
3.0MB
MD5e788e5dd84c8c180b072cce3c16d329d
SHA12685fe8dcd081268a54560180232d574d048acd1
SHA25601022e210af142ecdfb8f85212aa90f39e1fe326a56e3e9c9ae53ef147b23547
SHA5126810df6bef6de35897a69187f7c73ab3b4e3c9982b742fbc64b7c81d206ca19ed482f9286c1232527a556a28b9b4d41f0982d942b10fd95a2c6d490a9f4ad96f