Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
submitted
09-11-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
6103f5423f45bc980683947a92e84bce.exe
Resource
win7-20241010-en
General
-
Target
6103f5423f45bc980683947a92e84bce.exe
-
Size
1.8MB
-
MD5
6103f5423f45bc980683947a92e84bce
-
SHA1
9fd569e7a11bf99a7aae850b040e312e495575dd
-
SHA256
cc998f4c70f7f1ae0421def96970d66f6c97a3b606b0f9da80dd0c819e4bc1c4
-
SHA512
f46c23046f492c9c96f139f0d1aa91db26f280f7a5c0f8e95e4d1e340d341888124da9dd7e4a3a7da783b0604a6a54961eb86f6b9463a2777f69f4e49e7cae10
-
SSDEEP
49152:LaZ9FBMI0V9n1hf3P1+ZUCm8Sl6EUX79CeCXqiM:Lg9zeJz1+ZTmHtU36U
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://scriptyprefej.store
https://navygenerayk.store
https://founpiuer.store
https://necklacedmny.store
https://thumbystriw.store
https://fadehairucw.store
https://crisiwarny.store
https://presticitpo.store
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://navygenerayk.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b8089bac5e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b8089bac5e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b8089bac5e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b8089bac5e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b8089bac5e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b8089bac5e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc0a0058a9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d278ec2bac.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b8089bac5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsIECFHDBAAE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6103f5423f45bc980683947a92e84bce.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 10 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2336 chrome.exe 436 chrome.exe 1044 msedge.exe 3920 msedge.exe 5880 msedge.exe 5892 msedge.exe 1244 chrome.exe 2728 chrome.exe 2028 chrome.exe 5432 msedge.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6103f5423f45bc980683947a92e84bce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc0a0058a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc0a0058a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b8089bac5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsIECFHDBAAE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6103f5423f45bc980683947a92e84bce.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d278ec2bac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d278ec2bac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsIECFHDBAAE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b8089bac5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 6103f5423f45bc980683947a92e84bce.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation d278ec2bac.exe -
Executes dropped EXE 7 IoCs
pid Process 232 skotes.exe 3760 bc0a0058a9.exe 4732 d278ec2bac.exe 3340 b8089bac5e.exe 6052 skotes.exe 3572 DocumentsIECFHDBAAE.exe 4036 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine DocumentsIECFHDBAAE.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 6103f5423f45bc980683947a92e84bce.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine bc0a0058a9.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine d278ec2bac.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine b8089bac5e.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b8089bac5e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b8089bac5e.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b8089bac5e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005039001\\b8089bac5e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bc0a0058a9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005036001\\bc0a0058a9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d278ec2bac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005037001\\d278ec2bac.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 4820 6103f5423f45bc980683947a92e84bce.exe 232 skotes.exe 3760 bc0a0058a9.exe 4732 d278ec2bac.exe 3340 b8089bac5e.exe 6052 skotes.exe 3572 DocumentsIECFHDBAAE.exe 4036 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 6103f5423f45bc980683947a92e84bce.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc0a0058a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d278ec2bac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8089bac5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsIECFHDBAAE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6103f5423f45bc980683947a92e84bce.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d278ec2bac.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d278ec2bac.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133756169191371792" chrome.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4820 6103f5423f45bc980683947a92e84bce.exe 4820 6103f5423f45bc980683947a92e84bce.exe 232 skotes.exe 232 skotes.exe 3760 bc0a0058a9.exe 3760 bc0a0058a9.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 1244 chrome.exe 1244 chrome.exe 3340 b8089bac5e.exe 3340 b8089bac5e.exe 3340 b8089bac5e.exe 3340 b8089bac5e.exe 3340 b8089bac5e.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 4732 d278ec2bac.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5676 msedge.exe 5676 msedge.exe 5432 msedge.exe 5432 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe 5448 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 8 IoCs
pid Process 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe -
Suspicious use of AdjustPrivilegeToken 19 IoCs
description pid Process Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeDebugPrivilege 3340 b8089bac5e.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe Token: SeShutdownPrivilege 1244 chrome.exe Token: SeCreatePagefilePrivilege 1244 chrome.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 1244 chrome.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe 5432 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4820 wrote to memory of 232 4820 6103f5423f45bc980683947a92e84bce.exe 86 PID 4820 wrote to memory of 232 4820 6103f5423f45bc980683947a92e84bce.exe 86 PID 4820 wrote to memory of 232 4820 6103f5423f45bc980683947a92e84bce.exe 86 PID 232 wrote to memory of 3760 232 skotes.exe 100 PID 232 wrote to memory of 3760 232 skotes.exe 100 PID 232 wrote to memory of 3760 232 skotes.exe 100 PID 232 wrote to memory of 4732 232 skotes.exe 102 PID 232 wrote to memory of 4732 232 skotes.exe 102 PID 232 wrote to memory of 4732 232 skotes.exe 102 PID 232 wrote to memory of 2340 232 skotes.exe 103 PID 232 wrote to memory of 2340 232 skotes.exe 103 PID 232 wrote to memory of 2340 232 skotes.exe 103 PID 4732 wrote to memory of 1244 4732 d278ec2bac.exe 104 PID 4732 wrote to memory of 1244 4732 d278ec2bac.exe 104 PID 1244 wrote to memory of 2700 1244 chrome.exe 105 PID 1244 wrote to memory of 2700 1244 chrome.exe 105 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 3952 1244 chrome.exe 106 PID 1244 wrote to memory of 1484 1244 chrome.exe 107 PID 1244 wrote to memory of 1484 1244 chrome.exe 107 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108 PID 1244 wrote to memory of 5112 1244 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\6103f5423f45bc980683947a92e84bce.exe"C:\Users\Admin\AppData\Local\Temp\6103f5423f45bc980683947a92e84bce.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Users\Admin\AppData\Local\Temp\1005036001\bc0a0058a9.exe"C:\Users\Admin\AppData\Local\Temp\1005036001\bc0a0058a9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3760
-
-
C:\Users\Admin\AppData\Local\Temp\1005037001\d278ec2bac.exe"C:\Users\Admin\AppData\Local\Temp\1005037001\d278ec2bac.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\\Program Files\\Google\\Chrome\\Application\\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff91eaccc40,0x7ff91eaccc4c,0x7ff91eaccc585⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1912,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:25⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2164,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:35⤵PID:1484
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2240,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:85⤵PID:5112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:2336
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3248 /prefetch:15⤵
- Uses browser remote debugging
PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4544,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4500 /prefetch:15⤵
- Uses browser remote debugging
PID:2028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4528,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4724 /prefetch:85⤵PID:2492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4300,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4692 /prefetch:85⤵PID:4392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4292,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4664 /prefetch:85⤵PID:4404
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5028,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5032 /prefetch:85⤵PID:4028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5048,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4688 /prefetch:85⤵PID:1408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4288,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4692 /prefetch:85⤵PID:2416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4684,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5072 /prefetch:85⤵PID:2220
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5272,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5140 /prefetch:85⤵PID:4756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --field-trial-handle=4692,i,13099262306851846919,8652062467361732820,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=5276 /prefetch:25⤵
- Uses browser remote debugging
PID:436
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\\Program Files (x86)\\Microsoft\\Edge\\Application\\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5432 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ff91fd346f8,0x7ff91fd34708,0x7ff91fd347185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:5668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2188 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2940 /prefetch:85⤵PID:5740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:15⤵
- Uses browser remote debugging
PID:5880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3400 /prefetch:15⤵
- Uses browser remote debugging
PID:5892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4828 /prefetch:15⤵
- Uses browser remote debugging
PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5012 /prefetch:15⤵
- Uses browser remote debugging
PID:3920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2148 /prefetch:25⤵PID:5336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:25⤵PID:1540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2308 /prefetch:25⤵PID:1996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=4672 /prefetch:25⤵PID:4660
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=2152 /prefetch:25⤵PID:1940
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=2404 /prefetch:25⤵PID:5752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2124,7827044540699441542,4925488741468805212,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=disabled --mojo-platform-channel-handle=3712 /prefetch:25⤵PID:5964
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsIECFHDBAAE.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Users\Admin\DocumentsIECFHDBAAE.exe"C:\Users\Admin\DocumentsIECFHDBAAE.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:3572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\1005039001\b8089bac5e.exe"C:\Users\Admin\AppData\Local\Temp\1005039001\b8089bac5e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3340
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3376
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4392
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:6052
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:4036
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD5eda18948a989176f4eebb175ce806255
SHA1ff22a3d5f5fb705137f233c36622c79eab995897
SHA25681a4f37c5495800b7cc46aea6535d9180dadb5c151db6f1fd1968d1cd8c1eeb4
SHA512160ed9990c37a4753fc0f5111c94414568654afbedc05308308197df2a99594f2d5d8fe511fd2279543a869ed20248e603d88a0b9b8fb119e8e6131b0c52ff85
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
649B
MD5931b2e8f7784dfc922015b8ca642cec6
SHA187492d483d6f93b89e6248d59b9909091426f511
SHA256c1f37c1fc72a63c3098245d9618c230977fddb961be14b7622cd6ac83e867bcb
SHA512da96bd4396bb6676d88bf7b90b0afad490d19b7c40dc9f71b4e05afa1f9d2b359edc4164d276b8cd859fc4c4452ebb356fbe325881fe83c2a48fba08ecd88286
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\_locales\en_CA\messages.json
Filesize851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.83.1_0\dasherSettingSchema.json
Filesize854B
MD54ec1df2da46182103d2ffc3b92d20ca5
SHA1fb9d1ba3710cf31a87165317c6edc110e98994ce
SHA2566c69ce0fe6fab14f1990a320d704fee362c175c00eb6c9224aa6f41108918ca6
SHA512939d81e6a82b10ff73a35c931052d8d53d42d915e526665079eeb4820df4d70f1c6aebab70b59519a0014a48514833fefd687d5a3ed1b06482223a168292105d
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
284B
MD57c7facc553c3edb6cf6e0053a52a4acd
SHA1233691338131f7a3567994424e3fe350fc6f30f9
SHA2563e9d8739834f6d88b0733a7edbc7d018c98bd385f9e2f624e1416f532252381c
SHA51219a524ad8e99ffea7cadcb7a8831b7939975860bff53f7414112338141c1b43b01a0fbb8c0068100d9834ead2003b341aeb3b36c78bec4a3e88a3c07075b267c
-
Filesize
552B
MD5a0c3c0c8b73af4e0e4a1c56234e8090d
SHA18dbbe4f5bbaaf2dd5337df7040e18618bef6fa03
SHA25666558a1731c520da4e1c24d7be86f08f5f7652b5a97ac6c7a463ff5c4a78103b
SHA512b8e7d437afaffea03fdb6759671abbe58f513e3251277e8d10ce8383c6f3d008aafa77880e36ce7fdde8c0d4364f358485374106a4ebca3804b78b8b87ddb26d
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\06fa348e-340e-492a-b468-3893fabfc38c.dmp
Filesize830KB
MD52ce3502eb63c22b47e62f3c65a6280d1
SHA167bcbac4b8469e0d30b43c60a48533cff0ce2c01
SHA2569d8f2b36fbf88d33d77fc0199667b4db0b0d5803c84e3d728c1c6a987e3d3a07
SHA512e55de2c89a12b8d66e26085f33d545624c24fa73375a98ed31c97aa8e6a496ed93806d2aaf8301ab38106527664dd72909e571a33f9ec12b52422fc1e9865d78
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\53264979-1d37-4882-a8bf-ae8f4f32711a.dmp
Filesize826KB
MD5a61f9ea6781fad3b266c9de34e8794b4
SHA16b5f6fa664bfed5c49eca801a5d361f60a9b4493
SHA256cb94e8c1f50b927e8b15238178a3331f1087336dcb3394e9aa34b9d3691061f3
SHA512c61dd89f4d84bb1dd5cc9127b8b483187223b6657761edc6a1ef401c6da5b2be580291e7328c26ae47cf534a5faa413231c043bc57dbcef7daa72c81f0012fdc
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\97c2ce8a-c7a0-4469-a2d6-6cffe99b6a91.dmp
Filesize826KB
MD5bbb431eaef27eb1f420567c2efc05541
SHA110d427b2f54f64b8be66aab78750134f698d8e70
SHA25616551d05a5912f2ceaf14326cd9812ec544fe82e48cf9974e135f28551450bb4
SHA5121b884398222184266129716b4c47b3efd1b32b2fe1dd7153245077dcee4b2a50f00dcee99122fac50cba1e2909751f2de2d497487ee4ffa8e0c3bdf4ab959d15
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\c66ef3e9-333b-4b2e-be99-f25df13a5f31.dmp
Filesize838KB
MD5647f40074ed2df01fba6d696606a422b
SHA1901ea3601aeaf964d14b106b780b7f4f8cad944c
SHA256d21668b921af505d9a9613081a814b16bd2b9d1029c5cbb95060653de1844ea4
SHA51232a548b8becefe70ae2d411c2570e904a4087240a32634083145960fb5c53346ff5a7df6dd0a5ea2ebf55a447d87723495b48b7c21f4b41bda53441ab692a11a
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ca2cda8a-df28-41b4-b882-8097a48b7a95.dmp
Filesize838KB
MD57709556c40f457f8440734cc25de6783
SHA1fd42043630c989bab5d9104b5e1b82921fce1429
SHA256460e17d141507f3d5905a43375387fe4e44f4b190fb1421330e0f4253ac30c9f
SHA512a9f4a5dfd279356bd0850071f901641332b04cd3f0f58271e455de69cc0f956fdf9656ba493113d06f66791cb41685ba8dc4a1b8c0cdefc7c5617404cafbd376
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\db42448b-8217-4686-ab43-4c0b1d9ff116.dmp
Filesize826KB
MD5529e22e3bc4c239ca0266b85209ac50d
SHA1aed29dbe08c3ae48110dd34ef3c20227f00e536c
SHA256b1ff7468e540fd9aa6e9aa2b6c775f27ecd8c5afed05fe8135bdf18450082035
SHA5120dce24db100880018a7ee08df81e63bb1c145fd26f10caf24f81c29d97e567ff2e0eb224aa85d518d3f8a6b34a23a7265bda1efd96992709a08a786f3eac975c
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ec86ab95-66f5-48e3-b679-26b9d9b3ed45.dmp
Filesize838KB
MD50423f98da00ee4c27918d505c44c1928
SHA1dbaad29c602f7cd813d0b764b486d953bec7ede4
SHA256f203315ef065a55e5d52cd28a5f08c92443f8b4691f429bf70d179b028b18bb5
SHA512fe522a5bdc76a81c7256d2f15ff7e8b133dab78bfca72306b56fbca81662da2eb39b7b25d0f445988543cedd8b6fa36aa8ab1a529a31aebe34469da30b627902
-
Filesize
152B
MD5d22073dea53e79d9b824f27ac5e9813e
SHA16d8a7281241248431a1571e6ddc55798b01fa961
SHA25686713962c3bb287964678b148ee08ea83fb83483dff8be91c8a6085ca560b2a6
SHA51297152091ee24b6e713b8ec8123cb62511f8a7e8a6c6c3f2f6727d0a60497be28814613b476009b853575d4931e5df950e28a41afbf6707cb672206f1219c4413
-
Filesize
152B
MD5bffcefacce25cd03f3d5c9446ddb903d
SHA18923f84aa86db316d2f5c122fe3874bbe26f3bab
SHA25623e7cbbf64c81122c3cb30a0933c10a320e254447771737a326ce37a0694d405
SHA512761dae5315b35ec0b2fe68019881397f5d2eadba3963aba79a89f8953a0cd705012d7faf3a204a5f36008926b9f614980e333351596b06ce7058d744345ce2e7
-
Filesize
152B
MD5f11a1ecc69438c6bd10f77ab80d1525d
SHA17f89f9820bbaf46b176e02d36caa0ca820f570f7
SHA25693b5bcd4c9ae7a1d9187d10ae27023aa64755304ca6626ae78808f4c49cd53fd
SHA5126932e86daf50bf8d90887c15dffbe55db1a4939e9a4ab25fa594745e413dad07d6f7b6bc0f5dc03683a4802a0a27c012b7de12833ad413723bc2a7d9a4d7a355
-
Filesize
152B
MD502c5ed7f060240cb7ba472e8cace6675
SHA1ab6ea5fe633e7c5b66e2873c01f7708f61c247f6
SHA2568e6df115555e346ce9feea623a1767bbe1bc7f643b157b0679b453fcc79bd2b4
SHA5128ea348df5daab3873769482e75ac1d0ecbaedfba56c017cf26ff9596e8078bf2ed83f0166017e4498ff16996c50e277932f1a0b745ced6aacb62192db96793b7
-
Filesize
152B
MD515a4d97da90671c6c2e0bb266bf6d100
SHA1a647f09ffaf089495aafb5ddd7580553ebf3c787
SHA256791c73a0cdeafa318055c67986025511a6e6138600d150a7696d5bab33a6ff6c
SHA5123a9a4b0e7f2473d758ad8f97449d48c255ef15cdb7c6a1f2b68aef8ae52580bfc10ab396ea1a3f4626346ce2aa2b51d69f74bd6500d4ebb69014e1a40cb7eb6a
-
Filesize
5KB
MD55c9a0e16fb3216d47226b320399b9d72
SHA1b71b7d791019f24322f7c1a90cfa872988a68e7e
SHA256b690c6d60984c530330311712c6ebc9ef3dc0cc7fb46cb1304ae0cf9139421ec
SHA512aba561eee5687c786f2c790e78ca1d97fc2a60450ae46fbd01e98630c6cc16c0b337a107e83b0b3ccc7009c8ac68aa3c844cc9e4b5a983314cb144449ed1ddde
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f96bcd64-f034-42d4-bbc1-93ecc4d59049.tmp
Filesize1B
MD55058f1af8388633f609cadb75a75dc9d
SHA13a52ce780950d4d969792a2559cd519d7ee8c727
SHA256cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8
SHA5120b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
2.9MB
MD577bc76aa9e8e6d5916f06887014cb2e8
SHA12a06b83b186945145b901c95dc8ff63321c78f1f
SHA2561602395865ab78a9e84d8cd9b9b948d4be8e48573feb25e07f16ff3d8043d888
SHA512305a54be3787ac704b1884b8a6ee34097386a1b397baf13e23f3b4bc1c207a15005c7634d048d6ba4216052ff3d46fbe043040585921ec194017fa5e8fa18cb7
-
Filesize
2.1MB
MD56fd1a6a721b41de370d8ed5d1e2de198
SHA1eade351571a68acb2003301f3b29b165deed11f8
SHA256ef8c97d1e594b9d78f0192d8f83a29cbd83acaea0c6b507bed5cacc4ff0a1a88
SHA51286357d6173b1039ba2c57b5411e3ba49b26cc08a8aaf09da3f0c7b37c380dff7910fafda7ec631ceb78af7091422cbacbd7e5e12a4be453212373188a0395e07
-
Filesize
2.6MB
MD51f50318420c161c3236cff3b83ec855b
SHA1fb05367a71af2334e050162ca3b8b7d1729adad2
SHA25629b319c2958b485c848cb8d00c730ee8d488249ad6b9ea1b0e1d28e1593b0a65
SHA5128cc06af87e2d6617c720d571f4737a9d8773f3cb8ecc99d7c0fb58e847d3b4234edfb09084f34211c3d20a1b1616d964a1b0d7b16817c595aaac31c3a444e332
-
Filesize
1.8MB
MD56103f5423f45bc980683947a92e84bce
SHA19fd569e7a11bf99a7aae850b040e312e495575dd
SHA256cc998f4c70f7f1ae0421def96970d66f6c97a3b606b0f9da80dd0c819e4bc1c4
SHA512f46c23046f492c9c96f139f0d1aa91db26f280f7a5c0f8e95e4d1e340d341888124da9dd7e4a3a7da783b0604a6a54961eb86f6b9463a2777f69f4e49e7cae10
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1244_1804795797\8d8e543c-86de-4399-85a8-627347afbd30.tmp
Filesize132KB
MD5da75bb05d10acc967eecaac040d3d733
SHA195c08e067df713af8992db113f7e9aec84f17181
SHA25633ae9b8f06dc777bb1a65a6ba6c3f2a01b25cd1afc291426b46d1df27ea6e7e2
SHA51256533de53872f023809a20d1ea8532cdc2260d40b05c5a7012c8e61576ff092f006a197f759c92c6b8c429eeec4bb542073b491ddcfd5b22cd4ecbe1a8a7c6ef
-
C:\Users\Admin\AppData\Local\Temp\scoped_dir1244_1804795797\CRX_INSTALL\_locales\en_CA\messages.json
Filesize711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
3.1MB
MD50b48efdcb67967a431abea319e1cb7aa
SHA174b73d85bbf1b704e5481fc2d524e3aeb924b74f
SHA25632f90c5e022dab5b84e3d3962fc68c53ca43fa0b281a310ada04534a2f0ad49b
SHA512e629d949435721322f130b8f88ae759ec42e5868b5cd2cd9fdef3955984ea04afb54deec8467665b4e755b1e36a87e5e12986eeac82649492e97a9a0a200f809