Analysis
-
max time kernel
115s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/11/2024, 11:02
Static task
static1
Behavioral task
behavioral1
Sample
a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe
Resource
win7-20240729-en
General
-
Target
a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe
-
Size
3.1MB
-
MD5
3f37f3ed555ba8cb563f1c44d48f7dc0
-
SHA1
4e48a0cc1ca64a4adf0fe130c271e042c8d5cf79
-
SHA256
a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551
-
SHA512
4231e1529f2c8d6dee89adbd852d2aaf19f14a274262f6d833467db493f4e713563631f3b12659fc9e2610e9714b6d3dcae94c206b5fe94c5888b5a8f53f54f2
-
SSDEEP
49152:/C4Wly0+XQ/Z4DmYG9xxx1UU/8dxSleIGlr9edvLoIsnFkitulfDN+:/C4WyfcZ4DmYG3xxWheebkiI
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://thicktoys.sbs/api
https://3xc1aimbl0w.sbs/api
https://300snails.sbs/api
https://faintbl0w.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/1676-115-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b43b0d21ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b43b0d21ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b43b0d21ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b43b0d21ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b43b0d21ee.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b43b0d21ee.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a137670a7f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0193833607.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b43b0d21ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e090bd6cdf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 3492 chrome.exe 2704 chrome.exe 4956 chrome.exe 1648 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e090bd6cdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b43b0d21ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e090bd6cdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a137670a7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0193833607.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b43b0d21ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a137670a7f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0193833607.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation e090bd6cdf.exe -
Executes dropped EXE 9 IoCs
pid Process 2208 skotes.exe 388 a137670a7f.exe 844 0193833607.exe 340 skotes.exe 2476 b43b0d21ee.exe 1676 e090bd6cdf.exe 1008 service123.exe 3896 skotes.exe 752 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine a137670a7f.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 0193833607.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine b43b0d21ee.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine e090bd6cdf.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe -
Loads dropped DLL 2 IoCs
pid Process 1008 service123.exe 752 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b43b0d21ee.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b43b0d21ee.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a137670a7f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005952001\\a137670a7f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0193833607.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005953001\\0193833607.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b43b0d21ee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005955001\\b43b0d21ee.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1508 a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe 2208 skotes.exe 388 a137670a7f.exe 844 0193833607.exe 340 skotes.exe 2476 b43b0d21ee.exe 1676 e090bd6cdf.exe 3896 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 316 1676 WerFault.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a137670a7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0193833607.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b43b0d21ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e090bd6cdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e090bd6cdf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e090bd6cdf.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2420 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1508 a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe 1508 a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe 2208 skotes.exe 2208 skotes.exe 388 a137670a7f.exe 388 a137670a7f.exe 844 0193833607.exe 844 0193833607.exe 340 skotes.exe 340 skotes.exe 2476 b43b0d21ee.exe 2476 b43b0d21ee.exe 2476 b43b0d21ee.exe 2476 b43b0d21ee.exe 1676 e090bd6cdf.exe 1676 e090bd6cdf.exe 2704 chrome.exe 2704 chrome.exe 3896 skotes.exe 3896 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2476 b43b0d21ee.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeCreatePagefilePrivilege 2704 chrome.exe Token: SeShutdownPrivilege 2704 chrome.exe Token: SeCreatePagefilePrivilege 2704 chrome.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe 2704 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1508 wrote to memory of 2208 1508 a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe 86 PID 1508 wrote to memory of 2208 1508 a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe 86 PID 1508 wrote to memory of 2208 1508 a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe 86 PID 2208 wrote to memory of 388 2208 skotes.exe 94 PID 2208 wrote to memory of 388 2208 skotes.exe 94 PID 2208 wrote to memory of 388 2208 skotes.exe 94 PID 2208 wrote to memory of 844 2208 skotes.exe 100 PID 2208 wrote to memory of 844 2208 skotes.exe 100 PID 2208 wrote to memory of 844 2208 skotes.exe 100 PID 2208 wrote to memory of 2364 2208 skotes.exe 102 PID 2208 wrote to memory of 2364 2208 skotes.exe 102 PID 2208 wrote to memory of 2364 2208 skotes.exe 102 PID 2208 wrote to memory of 2476 2208 skotes.exe 103 PID 2208 wrote to memory of 2476 2208 skotes.exe 103 PID 2208 wrote to memory of 2476 2208 skotes.exe 103 PID 2208 wrote to memory of 1676 2208 skotes.exe 104 PID 2208 wrote to memory of 1676 2208 skotes.exe 104 PID 2208 wrote to memory of 1676 2208 skotes.exe 104 PID 1676 wrote to memory of 2704 1676 e090bd6cdf.exe 108 PID 1676 wrote to memory of 2704 1676 e090bd6cdf.exe 108 PID 2704 wrote to memory of 3476 2704 chrome.exe 109 PID 2704 wrote to memory of 3476 2704 chrome.exe 109 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 2804 2704 chrome.exe 110 PID 2704 wrote to memory of 5040 2704 chrome.exe 111 PID 2704 wrote to memory of 5040 2704 chrome.exe 111 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112 PID 2704 wrote to memory of 1044 2704 chrome.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe"C:\Users\Admin\AppData\Local\Temp\a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551N.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\1005952001\a137670a7f.exe"C:\Users\Admin\AppData\Local\Temp\1005952001\a137670a7f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:388
-
-
C:\Users\Admin\AppData\Local\Temp\1005953001\0193833607.exe"C:\Users\Admin\AppData\Local\Temp\1005953001\0193833607.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:844
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\1005955001\b43b0d21ee.exe"C:\Users\Admin\AppData\Local\Temp\1005955001\b43b0d21ee.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\1005956001\e090bd6cdf.exe"C:\Users\Admin\AppData\Local\Temp\1005956001\e090bd6cdf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd3682cc40,0x7ffd3682cc4c,0x7ffd3682cc585⤵PID:3476
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:25⤵PID:2804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2172,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2184 /prefetch:35⤵PID:5040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2276,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:85⤵PID:1044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3240,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:15⤵
- Uses browser remote debugging
PID:4956
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3356,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3460 /prefetch:15⤵
- Uses browser remote debugging
PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4204,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4480 /prefetch:15⤵
- Uses browser remote debugging
PID:3492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4664,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4680 /prefetch:85⤵PID:1504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4656,i,9885094359345071232,7214890169261763813,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4836 /prefetch:85⤵PID:4688
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1008
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1676 -s 12804⤵
- Program crash
PID:316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:340
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4468
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1676 -ip 16761⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3896
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:752
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3.0MB
MD514213bc1265194d5d8176a0c980171f7
SHA1072426f65517ab6a53b92c28f41b410c1b78521a
SHA25645ab2dd8f940129af3600b52cb5fef094c14ce2f9afddd30b2b624c11d65f138
SHA5122850455477084b9584126144dd71d888869c04c81ebe28687bfc73b86752e7a61270d21454d95895611e5703caab96fc8ccf5f699fa7d7f1e09b2581b63785a3
-
Filesize
1.7MB
MD54ef056c57477a8cdf508b93aad388588
SHA118a90dbde56b1fdcdb10935fc29166df1322d51b
SHA256f2198db35c65adb3ca095325def052e519e840061e856a1f4e8ae4d68d66c526
SHA512ccee13089a8d775396aa025e6a46a5549d5235517660451a33a3ab663b39e907c4f7f340d4e6923b2d7637f78b3f762274bdd36efd207685abddcdd140a0eea1
-
Filesize
2.7MB
MD5ebe500347dff5aa2ed62b0be311708d1
SHA121383fde5e5f5a996549addedac518f77c276e6a
SHA2564d28a8ba49931c21b31d91b83ec8f5c31213cba3d03b13fbcfaa8a8ca5f71175
SHA512b70f2a6e35023c8e99e49fd08190727f7704c5ca8596f9c2bd8d8387fdca9fb38934d46ea97fa972bb846721eb2878e92bc2023924760facf45937e2acefb883
-
Filesize
4.2MB
MD5343d04fe2c54b826ab8dd68af58bc511
SHA17ec2a009680b24bbb634372f854c29081b1709c6
SHA256d2ce21cc3ee103cd36406ecfcb0f6c5e3a937e4159269abfe698bededa27f4ef
SHA5125961e23d96d395c09cb6e1c5d7416ad4eb7d220138d3f1262b62c47e73438caea7281e2b9a682d26b958270c11082524c6b092d99b8af66327b945e3c4d5eaee
-
Filesize
3.1MB
MD53f37f3ed555ba8cb563f1c44d48f7dc0
SHA14e48a0cc1ca64a4adf0fe130c271e042c8d5cf79
SHA256a604d7f02b52f55cf29de06b95c46eab8b3c2026e2572a176820bc5dbee59551
SHA5124231e1529f2c8d6dee89adbd852d2aaf19f14a274262f6d833467db493f4e713563631f3b12659fc9e2610e9714b6d3dcae94c206b5fe94c5888b5a8f53f54f2