Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-11-2024 14:29
Static task
static1
Behavioral task
behavioral1
Sample
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe
Resource
win10v2004-20241007-en
General
-
Target
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe
-
Size
3.1MB
-
MD5
03c0a5c86aea63fefd8c69932449652e
-
SHA1
132a6a5654ca669c42d010c96c4c2351abf147ac
-
SHA256
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164
-
SHA512
f1a680a76c906b44cba6ebeb41f1b8e0dd8597afb635c4bc079fee2e98dc2394f3f4be4c8f4ec15bbfd0bb9676f659397087480d94de6c86f8f21c55379705e7
-
SSDEEP
98304:MtSdf5zUdfXwae2HVMCbexECfqDvUmrTRgB/:rdt3faRrql
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2124-86-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
3efb0f0c95.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 3efb0f0c95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 3efb0f0c95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 3efb0f0c95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 3efb0f0c95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 3efb0f0c95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 3efb0f0c95.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exeskotes.exeskotes.exe65e40ce2d9.exe3efb0f0c95.exeskotes.exeskotes.exe1ce9e72c3a.exed57cdc48f5.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 65e40ce2d9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3efb0f0c95.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1ce9e72c3a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d57cdc48f5.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 1832 chrome.exe 868 chrome.exe 4348 chrome.exe 3396 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3efb0f0c95.exeskotes.exebe25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe1ce9e72c3a.exed57cdc48f5.exe65e40ce2d9.exeskotes.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3efb0f0c95.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ce9e72c3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1ce9e72c3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d57cdc48f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d57cdc48f5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 65e40ce2d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 65e40ce2d9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3efb0f0c95.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exeskotes.exe1ce9e72c3a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1ce9e72c3a.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exeskotes.exe1ce9e72c3a.exed57cdc48f5.exe65e40ce2d9.exe3efb0f0c95.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4228 skotes.exe 4448 skotes.exe 2124 1ce9e72c3a.exe 1644 d57cdc48f5.exe 2928 65e40ce2d9.exe 1808 3efb0f0c95.exe 1428 service123.exe 3240 skotes.exe 5288 service123.exe 3256 skotes.exe 3276 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1ce9e72c3a.exed57cdc48f5.exebe25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exeskotes.exe65e40ce2d9.exe3efb0f0c95.exeskotes.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1ce9e72c3a.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine d57cdc48f5.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 65e40ce2d9.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 3efb0f0c95.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 1428 service123.exe 5288 service123.exe 3276 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
3efb0f0c95.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 3efb0f0c95.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 3efb0f0c95.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d57cdc48f5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005985001\\d57cdc48f5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\65e40ce2d9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005986001\\65e40ce2d9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3efb0f0c95.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1005988001\\3efb0f0c95.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 10 IoCs
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exeskotes.exeskotes.exe1ce9e72c3a.exed57cdc48f5.exe65e40ce2d9.exe3efb0f0c95.exeskotes.exeskotes.exepid process 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe 4228 skotes.exe 4448 skotes.exe 2124 1ce9e72c3a.exe 1644 d57cdc48f5.exe 2928 65e40ce2d9.exe 1808 3efb0f0c95.exe 1644 d57cdc48f5.exe 3240 skotes.exe 3256 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exedescription ioc process File created C:\Windows\Tasks\skotes.job be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3224 2124 WerFault.exe 1ce9e72c3a.exe -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
skotes.exe1ce9e72c3a.exed57cdc48f5.exe65e40ce2d9.exe3efb0f0c95.exeservice123.exeschtasks.exebe25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ce9e72c3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d57cdc48f5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65e40ce2d9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3efb0f0c95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
1ce9e72c3a.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1ce9e72c3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1ce9e72c3a.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exemsedge.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exeskotes.exeskotes.exe1ce9e72c3a.exed57cdc48f5.exe65e40ce2d9.exe3efb0f0c95.exechrome.exemsedge.exemsedge.exeidentity_helper.exeskotes.exeskotes.exepid process 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe 4228 skotes.exe 4228 skotes.exe 4448 skotes.exe 4448 skotes.exe 2124 1ce9e72c3a.exe 2124 1ce9e72c3a.exe 1644 d57cdc48f5.exe 1644 d57cdc48f5.exe 2928 65e40ce2d9.exe 2928 65e40ce2d9.exe 1808 3efb0f0c95.exe 1808 3efb0f0c95.exe 1808 3efb0f0c95.exe 1808 3efb0f0c95.exe 1808 3efb0f0c95.exe 1832 chrome.exe 1832 chrome.exe 1644 d57cdc48f5.exe 1644 d57cdc48f5.exe 1644 d57cdc48f5.exe 1644 d57cdc48f5.exe 1644 d57cdc48f5.exe 1644 d57cdc48f5.exe 1284 msedge.exe 1284 msedge.exe 5020 msedge.exe 5020 msedge.exe 1568 identity_helper.exe 1568 identity_helper.exe 3240 skotes.exe 3240 skotes.exe 3256 skotes.exe 3256 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 12 IoCs
Processes:
chrome.exemsedge.exepid process 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
3efb0f0c95.exechrome.exedescription pid process Token: SeDebugPrivilege 1808 3efb0f0c95.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe Token: SeShutdownPrivilege 1832 chrome.exe Token: SeCreatePagefilePrivilege 1832 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exechrome.exemsedge.exepid process 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 1832 chrome.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
Processes:
msedge.exepid process 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe 5020 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exeskotes.exe1ce9e72c3a.exechrome.exedescription pid process target process PID 1056 wrote to memory of 4228 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe skotes.exe PID 1056 wrote to memory of 4228 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe skotes.exe PID 1056 wrote to memory of 4228 1056 be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe skotes.exe PID 4228 wrote to memory of 2124 4228 skotes.exe 1ce9e72c3a.exe PID 4228 wrote to memory of 2124 4228 skotes.exe 1ce9e72c3a.exe PID 4228 wrote to memory of 2124 4228 skotes.exe 1ce9e72c3a.exe PID 4228 wrote to memory of 1644 4228 skotes.exe d57cdc48f5.exe PID 4228 wrote to memory of 1644 4228 skotes.exe d57cdc48f5.exe PID 4228 wrote to memory of 1644 4228 skotes.exe d57cdc48f5.exe PID 4228 wrote to memory of 2928 4228 skotes.exe 65e40ce2d9.exe PID 4228 wrote to memory of 2928 4228 skotes.exe 65e40ce2d9.exe PID 4228 wrote to memory of 2928 4228 skotes.exe 65e40ce2d9.exe PID 4228 wrote to memory of 4488 4228 skotes.exe skotes.exe PID 4228 wrote to memory of 4488 4228 skotes.exe skotes.exe PID 4228 wrote to memory of 4488 4228 skotes.exe skotes.exe PID 4228 wrote to memory of 1808 4228 skotes.exe 3efb0f0c95.exe PID 4228 wrote to memory of 1808 4228 skotes.exe 3efb0f0c95.exe PID 4228 wrote to memory of 1808 4228 skotes.exe 3efb0f0c95.exe PID 2124 wrote to memory of 1832 2124 1ce9e72c3a.exe chrome.exe PID 2124 wrote to memory of 1832 2124 1ce9e72c3a.exe chrome.exe PID 1832 wrote to memory of 3836 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3836 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 2328 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 1376 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 1376 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe PID 1832 wrote to memory of 3964 1832 chrome.exe chrome.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe"C:\Users\Admin\AppData\Local\Temp\be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\1005956001\1ce9e72c3a.exe"C:\Users\Admin\AppData\Local\Temp\1005956001\1ce9e72c3a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa2844cc40,0x7ffa2844cc4c,0x7ffa2844cc585⤵PID:3836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1904,i,5019369642427835509,6903084311662386206,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1900 /prefetch:25⤵PID:2328
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2028,i,5019369642427835509,6903084311662386206,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2480 /prefetch:35⤵PID:1376
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2104,i,5019369642427835509,6903084311662386206,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2584 /prefetch:85⤵PID:3964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3168,i,5019369642427835509,6903084311662386206,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3188 /prefetch:15⤵
- Uses browser remote debugging
PID:868
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3196,i,5019369642427835509,6903084311662386206,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:15⤵
- Uses browser remote debugging
PID:4348
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,5019369642427835509,6903084311662386206,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4496 /prefetch:15⤵
- Uses browser remote debugging
PID:3396
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1428
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3112
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2124 -s 12964⤵
- Program crash
PID:3224
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005985001\d57cdc48f5.exe"C:\Users\Admin\AppData\Local\Temp\1005985001\d57cdc48f5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=d57cdc48f5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:5020 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa287b46f8,0x7ffa287b4708,0x7ffa287b47185⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2156 /prefetch:25⤵PID:3784
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2804 /prefetch:85⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3260 /prefetch:15⤵PID:2208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3280 /prefetch:15⤵PID:3276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4960 /prefetch:15⤵PID:4508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:85⤵PID:3204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5128 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5264 /prefetch:15⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5208 /prefetch:15⤵PID:4884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4000 /prefetch:15⤵PID:4672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5032 /prefetch:15⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5420 /prefetch:15⤵PID:5196
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2160,8605527494539098149,9844582006227658789,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5224 /prefetch:15⤵PID:5320
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=d57cdc48f5.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:2968
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffa287b46f8,0x7ffa287b4708,0x7ffa287b47185⤵PID:4724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1005986001\65e40ce2d9.exe"C:\Users\Admin\AppData\Local\Temp\1005986001\65e40ce2d9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:4488
-
-
C:\Users\Admin\AppData\Local\Temp\1005988001\3efb0f0c95.exe"C:\Users\Admin\AppData\Local\Temp\1005988001\3efb0f0c95.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4576
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2124 -ip 21241⤵PID:4552
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4592
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5288
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3276
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5c2d9eeb3fdd75834f0ac3f9767de8d6f
SHA14d16a7e82190f8490a00008bd53d85fb92e379b0
SHA2561e5efb5f1d78a4cc269cb116307e9d767fc5ad8a18e6cf95c81c61d7b1da5c66
SHA512d92f995f9e096ecc0a7b8b4aca336aeef0e7b919fe7fe008169f0b87da84d018971ba5728141557d42a0fc562a25191bd85e0d7354c401b09e8b62cdc44b6dcd
-
Filesize
152B
MD5e55832d7cd7e868a2c087c4c73678018
SHA1ed7a2f6d6437e907218ffba9128802eaf414a0eb
SHA256a4d7777b980ec53de3a70aca8fb25b77e9b53187e7d2f0fa1a729ee9a35da574
SHA512897fdebf1a9269a1bf1e3a791f6ee9ab7c24c9d75eeff65ac9599764e1c8585784e1837ba5321d90af0b004af121b2206081a6fb1b1ad571a0051ee33d3f5c5f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\93e7b49f-f1de-4df4-8031-e51a4d78743f.tmp
Filesize6KB
MD5cb079602d13cd9fa836111e5c8202555
SHA1a2221f81c7b4b964cd92ebc12525b322f4464a4d
SHA2569372fdff015a7868f1e6bfa8a9d18d08f5edd7bab92a2815d8858e6650a67ad6
SHA512bcacb6c8fcdf891431d34b1b77dda04e0b35d98a2424b3cfa98bd336810c8ffa49a9b34d66af429437513c7b3250b3a48eda3ca93ad4cadd4e2d65df8b3d04a3
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d6379c167f4cdb483be62c414577f9bf
SHA1d56b094a907eb8f495674a4bdbee8c430f94e13f
SHA25680a9cda1e90b801b117d7f417677f7f5f240a07b40e2a7135ed2922972458f67
SHA512d5e23993a600b63db0b3f9b1c415417935f067f70f89750f773980adec16db938cafc42fb47c5bbd443578877a6461b248803a201e6b73cc09913d214a944796
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
5KB
MD5f164769f671b6ec90cbc132c81d81a59
SHA15a60deaaf3358a5df8e89770a69c084bb1e64182
SHA25685d9191c7d2c28bfa80ae2c4ac978f54d3c12b2d7b357cb125fd29d8ba2d9396
SHA512e17d92c34467d504736e983e0b1fd5cac2e1eed915a23863745e439acf22d7703c6e282d582f125601586f6a7f229ea5a30be86ccd0e1e02ee6d95f1e2977f20
-
Filesize
371B
MD56574ea960c0f60e644987d9acfbaa193
SHA1d5662d2f82258dfb963edf74131c57e96cdae1e0
SHA256c1edf35d8e826fd06250013568efa6a566cdb9c4ff0b8afa674e52200198b204
SHA5126fd8c2f4e2f2e61ce0ba4614d6cb1cdd49040efbd526f0e1d7d1c38e18a29cc1d830d7474f5024f820fecdd79d2036719cd1f1b3e4f13efaa8d05761e4f92072
-
Filesize
371B
MD513b34b830fd636ba9e8861f420073bf1
SHA1f3df9ab437c6276910541d3c79f4358502bc8c2f
SHA256fee5800deb6b2d26272d32d5a124f2fd3ae9900b6f9caa484a023d5da7f29c42
SHA5122b2a5d286a84152955b3e18b98766ca36cdd7664334f9d4e9f08aac5602466ee28415c63f0df45e00fa7a48fe66fc17c4f01f2baed66672c9d0dccc6df3aa197
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\f3be31c7-3d0c-4cc1-a929-1a9c628b946e.tmp
Filesize6KB
MD53d251e197b2596702d02be10851e6524
SHA142d6e18ef359a9dca28bca80b34555eace4ac797
SHA25646457db03fcd0c35af0277a085831776869160071609541af77268646f7995c9
SHA5127832e3b699b3924af3b5a9b9d9965a6565e9bd5ae11b7ebe6c1d743eb7cad4c7820aafe635afa08e7000206c312ff8d02838aadc140242fbba858197170d816d
-
Filesize
10KB
MD55116369f069032788171e818502a9b5d
SHA1426e401d7b45317148ec91518cfa3e683b9c4dc9
SHA256e6fefa444a97161922c492acb1df40210356c390ffebff45406fda8c7f5fd3aa
SHA512ad5b7960e4f52cfddd15938ed5dbb5d815cb7d1af8c0acf0f34512b360c3da742adfc2cc30c5de250b250c0ed44d6c988a58c95922e395be40b71f9ee093d50f
-
Filesize
4.2MB
MD594b60bd275ec39f3ad8b9030941ac33e
SHA15039074352bb79df6728ea5fb7ed226efe79a23f
SHA256a1b9bf43e9488615465150e648fa594e98c21114214456696626d82439c05345
SHA512f514d9b21063ea52711b5ba4e649f7b3bd47c09a2d1ab9f1f59cd1eb9aad74bc042b0f40c884ae7cb2e63c51b7fca720c15d20b632cb3385f1a1f0d51dfb0baf
-
Filesize
3.0MB
MD5eb4b5e50fabe588c24ac0baaa9d521af
SHA1d3eaccb2c7fb3198e7962535784748dde8d5c896
SHA2561f38d19213588d5c202cb33491175a72f403936ec55b9c88e2a6b48d8a3e122b
SHA512468f2398c8f4a2c070b5fb0004c34d1e4e4f0c015045e5fcc0a2774ee797a31fc64b1ffbc2d57017b57d75377ffa8c5911b2d960a8a6ea1fde0d7ca37f9d148e
-
Filesize
1.7MB
MD5177cf931c19b1f4b046ece1d0351584e
SHA18e360997e1bcadc755cc8c159561f54eae40fe15
SHA25698ff6f733ea3359f94687a21fcdc45298a76fa8eb4f26bb05bebb8a2a2bd11dc
SHA512fdccf91ef7e28b4ab8e9d1413d42971e352d65cc10b57ef4d05c0d76a2efc10b808bbc5e2fe4ae9eed7a99102e67e3f0ba5af24845b17829580e489ffce2e891
-
Filesize
2.7MB
MD52d7b10f1d1d53132873d81b253e628ee
SHA1cf0741624436c6e06d07fcf26ac41d4c3a2d9fe0
SHA2561ad376de935eca916329efc0cd63f08156dc9ea5082aa617f4c736db06e0ba36
SHA5127e264775147b52c1ed5c9953ef8abf4fc509684ba5d69b860302c5164e05b38c8036668a2efe6cdb3e2385867a5ac45c1ad29864edd3e700e487e09d0acf5bbf
-
Filesize
3.1MB
MD503c0a5c86aea63fefd8c69932449652e
SHA1132a6a5654ca669c42d010c96c4c2351abf147ac
SHA256be25ff1670cf7a87429e14a7810725ba148b8027c3ca98e2e70c649fd308c164
SHA512f1a680a76c906b44cba6ebeb41f1b8e0dd8597afb635c4bc079fee2e98dc2394f3f4be4c8f4ec15bbfd0bb9676f659397087480d94de6c86f8f21c55379705e7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e