Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/11/2024, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe
Resource
win7-20240903-en
General
-
Target
4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe
-
Size
3.1MB
-
MD5
36186abad1b6621bfa6a2910dc005972
-
SHA1
3ab630f001cf69137f8391ddbbec30a6211a94b0
-
SHA256
4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa
-
SHA512
9d3695f5f2314725ac237b819823b1898152b6c0611a119d583cdcff9dc808fa9ae6819b7723046be7b910142f88735921641a93042b7872b5af45784693d0d5
-
SSDEEP
49152:HVKPATlcyJJew+a6x+ECLoJqQHoYKNTW/dTtq:HVQAJcyJJew+a6x+vsJFoYNn
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection cc00436f02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cc00436f02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cc00436f02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cc00436f02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cc00436f02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cc00436f02.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c9fbfb6835.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc00436f02.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2f9b68f68c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c9fbfb6835.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc00436f02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2f9b68f68c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc00436f02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2f9b68f68c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c9fbfb6835.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 6 IoCs
pid Process 3064 skotes.exe 4284 2f9b68f68c.exe 1816 c9fbfb6835.exe 988 cc00436f02.exe 5264 skotes.exe 4000 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine c9fbfb6835.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine cc00436f02.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2f9b68f68c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features cc00436f02.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cc00436f02.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2f9b68f68c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006161001\\2f9b68f68c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c9fbfb6835.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006162001\\c9fbfb6835.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cc00436f02.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006164001\\cc00436f02.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 3064 skotes.exe 4284 2f9b68f68c.exe 1816 c9fbfb6835.exe 4284 2f9b68f68c.exe 988 cc00436f02.exe 5264 skotes.exe 4000 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f9b68f68c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9fbfb6835.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc00436f02.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 3064 skotes.exe 3064 skotes.exe 4284 2f9b68f68c.exe 4284 2f9b68f68c.exe 4284 2f9b68f68c.exe 4284 2f9b68f68c.exe 4284 2f9b68f68c.exe 4284 2f9b68f68c.exe 1816 c9fbfb6835.exe 1816 c9fbfb6835.exe 4284 2f9b68f68c.exe 4284 2f9b68f68c.exe 988 cc00436f02.exe 988 cc00436f02.exe 1180 msedge.exe 1180 msedge.exe 4560 msedge.exe 4560 msedge.exe 988 cc00436f02.exe 988 cc00436f02.exe 988 cc00436f02.exe 2708 identity_helper.exe 2708 identity_helper.exe 5264 skotes.exe 5264 skotes.exe 4000 skotes.exe 4000 skotes.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe 5296 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 9 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 988 cc00436f02.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe 4560 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3396 wrote to memory of 3064 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 86 PID 3396 wrote to memory of 3064 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 86 PID 3396 wrote to memory of 3064 3396 4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe 86 PID 3064 wrote to memory of 4284 3064 skotes.exe 91 PID 3064 wrote to memory of 4284 3064 skotes.exe 91 PID 3064 wrote to memory of 4284 3064 skotes.exe 91 PID 3064 wrote to memory of 1816 3064 skotes.exe 93 PID 3064 wrote to memory of 1816 3064 skotes.exe 93 PID 3064 wrote to memory of 1816 3064 skotes.exe 93 PID 3064 wrote to memory of 2640 3064 skotes.exe 96 PID 3064 wrote to memory of 2640 3064 skotes.exe 96 PID 3064 wrote to memory of 2640 3064 skotes.exe 96 PID 3064 wrote to memory of 988 3064 skotes.exe 97 PID 3064 wrote to memory of 988 3064 skotes.exe 97 PID 3064 wrote to memory of 988 3064 skotes.exe 97 PID 4284 wrote to memory of 4560 4284 2f9b68f68c.exe 98 PID 4284 wrote to memory of 4560 4284 2f9b68f68c.exe 98 PID 4560 wrote to memory of 2168 4560 msedge.exe 99 PID 4560 wrote to memory of 2168 4560 msedge.exe 99 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1372 4560 msedge.exe 100 PID 4560 wrote to memory of 1180 4560 msedge.exe 101 PID 4560 wrote to memory of 1180 4560 msedge.exe 101 PID 4560 wrote to memory of 3944 4560 msedge.exe 102 PID 4560 wrote to memory of 3944 4560 msedge.exe 102 PID 4560 wrote to memory of 3944 4560 msedge.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe"C:\Users\Admin\AppData\Local\Temp\4f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\1006161001\2f9b68f68c.exe"C:\Users\Admin\AppData\Local\Temp\1006161001\2f9b68f68c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2f9b68f68c.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7fffcd0046f8,0x7fffcd004708,0x7fffcd0047185⤵PID:2168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2192 /prefetch:25⤵PID:1372
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2244 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2888 /prefetch:85⤵PID:3944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3300 /prefetch:15⤵PID:320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3320 /prefetch:15⤵PID:3948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4992 /prefetch:15⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:85⤵PID:4568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5304 /prefetch:85⤵
- Suspicious behavior: EnumeratesProcesses
PID:2708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5300 /prefetch:15⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5176 /prefetch:15⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5020 /prefetch:15⤵PID:5344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5092 /prefetch:15⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5620 /prefetch:15⤵PID:5780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5796 /prefetch:15⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2180,12267572244689149766,385317070865268852,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2044 /prefetch:25⤵
- Suspicious behavior: EnumeratesProcesses
PID:5296
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument http://go.microsoft.com/fwlink/?prd=11324&pver=4.5&sbp=AppLaunch2&plcid=0x409&o1=SHIM_NOVERSION_FOUND&version=(null)&processName=2f9b68f68c.exe&platform=0009&osver=6&isServer=0&shimver=4.0.30319.04⤵PID:5708
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffcd0046f8,0x7fffcd004708,0x7fffcd0047185⤵PID:5720
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006162001\c9fbfb6835.exe"C:\Users\Admin\AppData\Local\Temp\1006162001\c9fbfb6835.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\1006164001\cc00436f02.exe"C:\Users\Admin\AppData\Local\Temp\1006164001\cc00436f02.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3280
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5264
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4000
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5f426165d1e5f7df1b7a3758c306cd4ae
SHA159ef728fbbb5c4197600f61daec48556fec651c1
SHA256b68dfc21866d0abe5c75d70acc54670421fa9b26baf98af852768676a901b841
SHA5128d437fcb85acb0705bf080141e7a021740901248985a76299ea8c43e46ad78fb88c738322cf302f6a550caa5e79d85b36827e9b329b1094521b17cf638c015b6
-
Filesize
152B
MD56960857d16aadfa79d36df8ebbf0e423
SHA1e1db43bd478274366621a8c6497e270d46c6ed4f
SHA256f40b812ce44e391423eb66602ac0af138a1e948aa8c4116045fef671ef21cd32
SHA5126deb2a63055a643759dd0ae125fb2f68ec04a443dbf8b066a812b42352bbcfa4517382ed0910c190c986a864559c3453c772e153ee2e9432fb2de2e1e49ca7fe
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize264B
MD5d9d15a1d7fe2d142e651bec996d37273
SHA1304996fcb109654a6c91b69a708d171a2db6455c
SHA2563d8ad9de0edad5e63860ce9a25717d854a636de06dc035fd7cff865869c6e1b8
SHA512c1cae1d76853c9cfd746caf338eb85f6dadb162ebeef57d140a8a8d62b299716c4cd8c744f414bc0911011589167f35f8a8731d08d1036c20f059a54f7f7d00d
-
Filesize
437B
MD505592d6b429a6209d372dba7629ce97c
SHA1b4d45e956e3ec9651d4e1e045b887c7ccbdde326
SHA2563aacb982b8861c38a392829ee3156d05dfdd46b0ecb46154f0ea9374557bc0fd
SHA512caa85bdccabea9250e8a5291f987b8d54362a7b3eec861c56f79cebb06277aa35d411e657ec632079f46affd4d6730e82115e7b317fbda55dacc16378528abaa
-
Filesize
5KB
MD5d6c2b1e479e0c225466d08691900edb9
SHA1ffca1e138d0c8ecc76d8db21b3c519ecd210c699
SHA256bf7eb03d3a5b2f3f7993e8156706f015d878ea9770dfdd1bd9d33869dc8d1198
SHA512a9c62fa3c8f62ea41c1c57c024788b258638439e2080886511a70c0164e7767a9f7244f977700b65773134de3c77c121db1c8bce697f728c1518d599fac07db2
-
Filesize
6KB
MD5de8ef06e15269023f75735b9f0e8d07c
SHA1b5d65bc6c797e1913c75f4f1b547710b3d919a16
SHA2567cd5dc170a75717d1794d1c9ad735f951ba2ea77d906a23e049ecb7298c80729
SHA512f597478e3f64aeedf3546326190644056cdc519499cf16d8bfb348ad41917c04c2f12a489dd849fc7513687d21f39c68b044bb2d936cc413cb6aee99154ab79e
-
Filesize
6KB
MD5a4ec05bca6146b81d558bf9082f0bc5b
SHA158fc4486515feffe09883c11e8d48edfb70a1f39
SHA25615b00578401db0a9b7467cdcf7a323e2afeecf9dce583208477f370b366064a4
SHA51253c7fcb26a49c3c5756b9b4240fbd722355a4f7fcfcbe62b2a0796425548a21d05b89d49b90d89c4cbb8425fa5f8befb8cba1b90f020aa922478e6e1939de5f5
-
Filesize
371B
MD5537c47844d05edbd595deb9ed630f141
SHA17b3b5dcf8e99ebb30b64e92245dafb855fc12058
SHA256614ab3708f46ce90eb3e28db909152008cd767d58088c9731e443f43f6230c50
SHA512c050818b66e78b355a3672c33ee54b28499181f169428cc206d96b387a4b75b841617a623391daad3eaad498ec8c01ce2838a109e8b813bc70ae99e44f2920e2
-
Filesize
371B
MD53bf2a3706fe48c31a08fceff85d36a13
SHA1aa7a53d9f05fab36ffdfc0030216585d3c26a4e9
SHA256cf6ec395349148def668132e0417e6a9bb0db0623fc7b3c99384fc1779d4df2e
SHA512ed2c2de0ab76fc07d69904a699583ebd9d15affe817a7e5058bf7f749aae0c625156b9b91f082e6b12aea593307924554ef70b21b3a915c12c79c34c43318025
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
10KB
MD53c77edf8d88c94a7625c5b25c0020f62
SHA109c7b769092b5a1af4f6a0e3d30f70d9810180f8
SHA2567276799e67697feaba6dac0072efaca2467c81dc12d7697d37544a8f7a906a85
SHA512d76c340d87f6e39a0e0820bcde16d193acbfad8b6a58220945511104b7edb4a36d8a381d81e6ca66e7e81a9733d52e2b27067d73750f0e6855fcca779fbb10bc
-
Filesize
2.9MB
MD532759286f0d328a68c63fbb0b85dacb7
SHA108df21f5f91ffc76293473dc8acfd3fa364678d7
SHA25621af6e9262502de17e772eafacaa6eedc2128c1a6c445801bbc0f06318143bf7
SHA5123afae0cc276fae073b4a07d8c3d90e28fb1585bc9cbc3e29519f8fd6b7148acb494cbf4497254537e8351ffd480604b0a91ee4107bd09ea915084245663a1922
-
Filesize
1.7MB
MD5673adb8fbfc09e598b9f2cd49291d360
SHA164b647245c6206581fd1ada3df3f9dc7dca75e9f
SHA256a3eaf680536f723aad903e7b9f0802699f113951925f3ffe25572345a79855d1
SHA512bc140fbc9bc2f31fc6df6db5fc52099920335b0e583585c7759a5bf4b2dba2f2a90da84b392e0c06a1ee0c7d8475fa6c1559ba3168fe31ad1c2699debcca9a31
-
Filesize
2.6MB
MD5cd92d8ecfa6e7c1ec2493affd71d2612
SHA1328676a428c2a17fe6b8ccbe7df1945b4eeda169
SHA256f4997a04a30174c18394454bd6e4f41631807041092ac17f25d2349422e7a2b7
SHA5123588b3f2ba99b6d0939dfc10ac19f560d5332584874fe284393364bef96c1331965e5a85964fd07cbea500f3e222e4c23336ff30616fd61f2370c9052b521883
-
Filesize
3.1MB
MD536186abad1b6621bfa6a2910dc005972
SHA13ab630f001cf69137f8391ddbbec30a6211a94b0
SHA2564f3d62f4662ecab837feb201384f04a6a0c79a3a8a2cda97ee6bab3a58e226aa
SHA5129d3695f5f2314725ac237b819823b1898152b6c0611a119d583cdcff9dc808fa9ae6819b7723046be7b910142f88735921641a93042b7872b5af45784693d0d5