Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 16:46
Static task
static1
Behavioral task
behavioral1
Sample
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe
Resource
win7-20240903-en
General
-
Target
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe
-
Size
1.7MB
-
MD5
6c5bb27bd5b827d365ce7fd795d9637d
-
SHA1
3d050afafa483b09d26a14c109629340e65bc07c
-
SHA256
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb
-
SHA512
cd6fb9b03aab5b7eb63e604afed350adac478bd09b7bfa6b6e4e61b7234ca99a907f428ff0dc25eec6f5470d16431f27069c34a48de26904bf3a3a19f443590f
-
SSDEEP
24576:yvGMgetZXrLrlQIUrKiVRMjIyKcpuXxLhABeRuYaZHaxuwaeJwg34xa:3MgYZbLrHCHMjIncgXxLhVcYm6Qwaa
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/2224-298-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
28d1947f30.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 28d1947f30.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 28d1947f30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 28d1947f30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 28d1947f30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 28d1947f30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 28d1947f30.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
Processes:
2d555de42f.exe28d1947f30.exea027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exeDocumentsAECAECFCAA.exeskotes.exe25f0d698fe.exef3a9a0f0fe.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d555de42f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 28d1947f30.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsAECAECFCAA.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 25f0d698fe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3a9a0f0fe.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 8 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exechrome.exepid Process 3000 chrome.exe 552 chrome.exe 2788 chrome.exe 1100 chrome.exe 2460 chrome.exe 952 chrome.exe 3056 chrome.exe 3040 chrome.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
28d1947f30.exe25f0d698fe.exeDocumentsAECAECFCAA.exeskotes.exef3a9a0f0fe.exe2d555de42f.exea027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28d1947f30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 25f0d698fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28d1947f30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 25f0d698fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsAECAECFCAA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3a9a0f0fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d555de42f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsAECAECFCAA.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3a9a0f0fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d555de42f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe -
Executes dropped EXE 9 IoCs
Processes:
DocumentsAECAECFCAA.exeskotes.exeSKOblik.exe25f0d698fe.exef3a9a0f0fe.exe2d555de42f.exe28d1947f30.exeservice123.exeservice123.exepid Process 3016 DocumentsAECAECFCAA.exe 1528 skotes.exe 444 SKOblik.exe 2224 25f0d698fe.exe 1368 f3a9a0f0fe.exe 1592 2d555de42f.exe 2496 28d1947f30.exe 2320 service123.exe 2948 service123.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe25f0d698fe.exef3a9a0f0fe.exe2d555de42f.exe28d1947f30.exea027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exeDocumentsAECAECFCAA.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 25f0d698fe.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine f3a9a0f0fe.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 2d555de42f.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 28d1947f30.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine DocumentsAECAECFCAA.exe -
Loads dropped DLL 20 IoCs
Processes:
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.execmd.exeDocumentsAECAECFCAA.exeskotes.exe25f0d698fe.exeWerFault.exeservice123.exeservice123.exepid Process 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 2880 cmd.exe 3016 DocumentsAECAECFCAA.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 1528 skotes.exe 2224 25f0d698fe.exe 2224 25f0d698fe.exe 1880 WerFault.exe 1880 WerFault.exe 1880 WerFault.exe 2320 service123.exe 2948 service123.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
28d1947f30.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 28d1947f30.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 28d1947f30.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\f3a9a0f0fe.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006474001\\f3a9a0f0fe.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\2d555de42f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006475001\\2d555de42f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\28d1947f30.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006477001\\28d1947f30.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
Processes:
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exeDocumentsAECAECFCAA.exeskotes.exe25f0d698fe.exef3a9a0f0fe.exe2d555de42f.exe28d1947f30.exepid Process 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 3016 DocumentsAECAECFCAA.exe 1528 skotes.exe 2224 25f0d698fe.exe 1368 f3a9a0f0fe.exe 1592 2d555de42f.exe 2496 28d1947f30.exe -
Drops file in Windows directory 1 IoCs
Processes:
DocumentsAECAECFCAA.exedescription ioc Process File created C:\Windows\Tasks\skotes.job DocumentsAECAECFCAA.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule behavioral1/files/0x000500000001a061-152.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 1880 2224 WerFault.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
f3a9a0f0fe.exe2d555de42f.exeschtasks.execmd.exeskotes.exe25f0d698fe.exea027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exeDocumentsAECAECFCAA.exe28d1947f30.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3a9a0f0fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d555de42f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 25f0d698fe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsAECAECFCAA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28d1947f30.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
25f0d698fe.exea027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 25f0d698fe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 25f0d698fe.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
chrome.exechrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Processes:
f3a9a0f0fe.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 f3a9a0f0fe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a f3a9a0f0fe.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 190000000100000010000000ba4f3972e7aed9dccdc210db59da13c90300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc251d00000001000000100000008f76b981d528ad4770088245e2031b630b0000000100000012000000440069006700690043006500720074000000140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc35300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703080f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a82000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a f3a9a0f0fe.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exechrome.exeDocumentsAECAECFCAA.exeskotes.exe25f0d698fe.exef3a9a0f0fe.exe2d555de42f.exe28d1947f30.exechrome.exepid Process 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 2788 chrome.exe 2788 chrome.exe 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 3016 DocumentsAECAECFCAA.exe 1528 skotes.exe 2224 25f0d698fe.exe 1368 f3a9a0f0fe.exe 1592 2d555de42f.exe 2496 28d1947f30.exe 2496 28d1947f30.exe 2496 28d1947f30.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
chrome.exe28d1947f30.exechrome.exedescription pid Process Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeShutdownPrivilege 2788 chrome.exe Token: SeDebugPrivilege 2496 28d1947f30.exe Token: SeShutdownPrivilege 3056 chrome.exe Token: SeShutdownPrivilege 3056 chrome.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
Processes:
chrome.exeDocumentsAECAECFCAA.exechrome.exepid Process 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 2788 chrome.exe 3016 DocumentsAECAECFCAA.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe 3056 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exechrome.exedescription pid Process procid_target PID 2072 wrote to memory of 2788 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 31 PID 2072 wrote to memory of 2788 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 31 PID 2072 wrote to memory of 2788 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 31 PID 2072 wrote to memory of 2788 2072 a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe 31 PID 2788 wrote to memory of 2800 2788 chrome.exe 32 PID 2788 wrote to memory of 2800 2788 chrome.exe 32 PID 2788 wrote to memory of 2800 2788 chrome.exe 32 PID 2788 wrote to memory of 2704 2788 chrome.exe 33 PID 2788 wrote to memory of 2704 2788 chrome.exe 33 PID 2788 wrote to memory of 2704 2788 chrome.exe 33 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 1112 2788 chrome.exe 35 PID 2788 wrote to memory of 2728 2788 chrome.exe 36 PID 2788 wrote to memory of 2728 2788 chrome.exe 36 PID 2788 wrote to memory of 2728 2788 chrome.exe 36 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37 PID 2788 wrote to memory of 1028 2788 chrome.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe"C:\Users\Admin\AppData\Local\Temp\a027ffa488a4671a6ba9c4cb37be87917752037d752f7ab8a3b544b351b8c7cb.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6969758,0x7fef6969768,0x7fef69697783⤵PID:2800
-
-
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2704
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1128 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:23⤵PID:1112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1512 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:83⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:83⤵PID:1028
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=1516 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2332 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:2460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1396 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:23⤵PID:1696
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1340 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3672 --field-trial-handle=1380,i,8178081535957241693,12141926548862310905,131072 /prefetch:83⤵PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsAECAECFCAA.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Users\Admin\DocumentsAECAECFCAA.exe"C:\Users\Admin\DocumentsAECAECFCAA.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\1006418001\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\1006418001\SKOblik.exe"5⤵
- Executes dropped EXE
PID:444
-
-
C:\Users\Admin\AppData\Local\Temp\1006449001\25f0d698fe.exe"C:\Users\Admin\AppData\Local\Temp\1006449001\25f0d698fe.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3056 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6689758,0x7fef6689768,0x7fef66897787⤵PID:2172
-
-
C:\Windows\system32\ctfmon.exectfmon.exe7⤵PID:1748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1100 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:27⤵PID:1520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1504 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:87⤵PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1596 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:87⤵PID:2308
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2168 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:3040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2192 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:3000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1244 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:27⤵PID:2508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1380 --field-trial-handle=1188,i,4801157649878529776,3309399483508724140,131072 /prefetch:17⤵
- Uses browser remote debugging
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2320
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2696
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 9246⤵
- Loads dropped DLL
- Program crash
PID:1880
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006474001\f3a9a0f0fe.exe"C:\Users\Admin\AppData\Local\Temp\1006474001\f3a9a0f0fe.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1368
-
-
C:\Users\Admin\AppData\Local\Temp\1006475001\2d555de42f.exe"C:\Users\Admin\AppData\Local\Temp\1006475001\2d555de42f.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\1006477001\28d1947f30.exe"C:\Users\Admin\AppData\Local\Temp\1006477001\28d1947f30.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:3036
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2396
-
C:\Windows\system32\taskeng.exetaskeng.exe {4FF02238-999F-4EB8-8BD7-7C0753C03FBE} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40B
MD5a5ff7b8d3f9da95f3edc95416ad0ee3a
SHA1a1d3fb57133e5369e14db282af76e1c6593cc9b2
SHA2567237c8d0f62cf771e73c5e6099e0ff332f3bd57474348b304390afb190f9fcfd
SHA512d0ac399fbcf673e3045e62b5bdeee954cf08fe562f2aba8c718980b504e00af2cb3c14ee28c719fc46058cb9ede922f373f2d53e585e29c4d7e1d2eecea2898e
-
Filesize
16B
MD5979c29c2917bed63ccf520ece1d18cda
SHA165cd81cdce0be04c74222b54d0881d3fdfe4736c
SHA256b3524365a633ee6d1fa9953638d2867946c515218c497a5ec2dbef7dc44a7c53
SHA512e38f694fd6ab9f678ae156528230d7a8bfb7b59a13b227f59f9c38ab5617db11ebb6be1276323a905d09c4066a3fe820cf58077ab48bf201f3c467a98516ee7a
-
Filesize
136B
MD5fe62f61786669ea3bb44bd795c514876
SHA1989db836f352dcd463e51191a80bac212f5dfa9a
SHA25666314ccffca2be2fd282259960ce69aa07d03cb1448522a510728c248bf32372
SHA512d2eaefd3866cfd68490991cd4b5758c260c15c6aed633d0122cede4cb572e3e88fa99a9bc007fbd5d04ec8d95d060b73c1f21654ff54348e6c8769df0ad28dbe
-
Filesize
50B
MD51be22f40a06c4e7348f4e7eaf40634a9
SHA18205ec74cd32ef63b1cc274181a74b95eedf86df
SHA25645a28788cde0d2a0232d19c391eae45777fe640790ac0674d6daa5672c444691
SHA512b8f6f42d375e3ad8015d744fa2814994fa6e588b41cce0131fca48194dd40146b08169a8ce0da350525ff32a59a16edb503c72e0f07254955c82a0d38074856e
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
136B
MD5f719e63fa3e9c0e24da809a5a58a7cc4
SHA1f2bc9404e4e62a162cd91fe1a4eef4c13457e33e
SHA25601975da0d34bef7f0c587e92688c004536a7d344ff8f776f7e7428252e548771
SHA512048bc7393d829c53c9ea73a3a44ee26d98426ddc6f17df8bcd920bd2f9fc213ab0881e224940ac797e34b1e3c4a6dbe38204df08676f563c8384b0fdcc54320e
-
Filesize
247B
MD53cf229389bcbca9f187017fa94a24602
SHA1f2e34816fd5b94caf61dbb4e56a8d9778590e9eb
SHA256bdf92ec56d51c97dacbc4a68cb950469baf90bdc696a5f5550de745b304c3f6f
SHA51287a1ff9a9b38b45c9716f7e242aca8603be1c6afbd0459e84b9a15d725c01ffb3ea61603155602328c8d53c8adb328167e235cd52646fcaccd9f5e24b7741a3d
-
Filesize
136B
MD597b568620ea08ff9a8c59e66c0719234
SHA1ca5fd0de4a6c0eafcaae9763f2ffd399aa373f57
SHA2565db53a909db2931ce913da62d24e8566ce0724a6151773fa656c38dc3be258a5
SHA512606dd0d39c98df03d33deb5424e7e591c83a76540142c2a72d9ea69009a1de3c87ad52d177c91de189c349064d2acd72c18f5b5607383d68d12c93822dcc7453
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\MANIFEST-000007
Filesize107B
MD522b937965712bdbc90f3c4e5cd2a8950
SHA125a5df32156e12134996410c5f7d9e59b1d6c155
SHA256cad3bbec41899ea5205612fc1494fa7ba88847fb75437a2def22211a4003e2eb
SHA512931427ad4609ab4ca12b2ee852d4965680f58602b00c182a2d340acf3163d888be6cfad87ca089f2b47929ddfa66be03ab13a6d24922397334d6997d4c8ede3b
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
1KB
MD511adda63486421b7272510c29b5eff3f
SHA1ace4f2d1aedcd945e5cc75b5fd669efd4bb35778
SHA256140da9b1707935b11412900464e7fe3b093d08e508a46ce0c44ad81fabf69c2d
SHA512dad94f6bac7b2776781bd32955f8c143cdcf728cce1ac7138db414016fd4663054b0d71664152298d28e59f72ba8265546e217d56237f4210d1d52155456f1ba
-
Filesize
2KB
MD5f63d23e1c54606f8c9e97072e48865cf
SHA15096c8e3f9499f37db4c0f8b3e26b827b59dd43f
SHA25603d89393b8252e49a261f933d08859bfd9e12da76046d1f13af358119ecf8fe9
SHA5124803a91dfe55264c80f581b72292a1a13966854245cd5d1c4897ac533d7df8a882aa38999bc9f5f6fd0394e55c5bdefe2805a2f1ee8d142c61e7352448106647
-
Filesize
245B
MD5a9157ac92779f50af4200e4af1fe6bb5
SHA1b4bcee16c8aad27280ef5db5a54187eae5114e00
SHA2564e00a10e5563e047c585d72a657b6342c1fecdf1e47d3b0f8b46451caec305b0
SHA512ae97362b49c93cd01bc0e36fffe42ef02902a3e40aa8cba40f8d605c1692481630e9df62dcbb82f0714f5542891dc63dfdbf5569850d9ded3d8c9d84f444cb75
-
Filesize
250B
MD503d881fc5a4ab4013bd1b30988abb179
SHA19ad861569715575d7b676e5683b14dd3cffec304
SHA2565da7b30f55f920166ad821f532fb95bd11546bf63a228fc41357aa122fcaf5e8
SHA51229ab8ac2c642a83086266f88ffde8d71c96cd0d98812fac526e0a0adc58d8bc7f99760ad19a71cc38c3ef5edb9ab9d642ef6b665bf4ce336260b0171411e26f6
-
Filesize
485B
MD5feb8fa6922c9845736264fb2668c4bf5
SHA1c62e0c1d6852e89a1496bc9eb20a5e9678b0b0bf
SHA256499cae945b7a3ae91fe8d6799dfe6ed933510806bd68c868189f61ce0511a1e3
SHA512291dccf5a43329cacf6c4f1ba0f8fda49600155f6986196934bdd7449f12d821b2caf6e30b932e34740ece2e389c9891763534fb5efc27a18b394c4a71282849
-
Filesize
57B
MD550e0a00e9e3eca5dd3e80d3e6e8b8eb6
SHA1f0afa409c7ab927938c8dedf7e57c0f355103cba
SHA2567c820f099ace6ab1f6694f5b610412ce0cd81c64a500bc8558ae5ff9042a9c8c
SHA5127834f7052e6d21e6aba4b5445b555103bfb9f1e04457a5aa7363918e97e0d7dfd0e08a9136c377600fd3a1c8818296b76e9eb09c7217b4e8b9229bb81689a79e
-
Filesize
249B
MD504b62476d889db52841469f6b4886697
SHA14bcfca0c9e32fd4b4a0d449516e56219634fba2f
SHA2561f8ddabb8f31e5cc9a60e0da30c1cb9d81008811a99d976758d4889336d8d437
SHA512888f48d330c74b253fdce8475d75da14e41d93e246f23e2f9187a3553ecd333350173735274279acc0adb5ebebc377b0d48641b34dafaddcc89be8dac556432b
-
Filesize
98B
MD51c0c23649f958fa25b0407c289db12da
SHA15f6b10cd5a39fe8c30353bcf4cd4e4a60ef35574
SHA256d5134b804a775cfb79c6166d15b5721d38ffc2da11948a6c1263595d6c2941cf
SHA512b691e882018833a108bd286bc76c55a140d00d5a266617a3a381af1ceff01aefaef17acef29d14dec931d7051455726cde8974cd04cc07302f1c3cc452fe2f52
-
Filesize
315B
MD57f752f0ffd35366642c56ec99d0c752f
SHA136801ed532b469b6db90f77adeaca2a165fd8ccd
SHA256a4ad6c25c37c7e01ec4a6fce255d365ea1df919116a920ca8abe8b1cacb5b360
SHA5123cc3a62a20626b7b30e1f12498f1c269d791c9756e183ed4ed757cf7c96fe4d51572fef994f33b60543986726342282b6fa433bc01c21bd690b6e04244dc9eb1
-
Filesize
34B
MD512275f46db968e27e4edb23a4517904d
SHA11bd41f5f55dc8532c45c5ed91bd0823deabe3d3a
SHA2560b9769e63620205002586d7dbefa19d6c3573ffa65bc86eb49113ec271feea4a
SHA512084364c331be5c6b8c537a6c56b732ccdbb45f0d74a1e0ed89ac195e9ae43e15f15c953e3ed188990f0abb7e0e6456fa4b6b34562a02c180f7c061a7728c8b66
-
Filesize
16B
MD560e3f691077715586b918375dd23c6b0
SHA1476d3eab15649c40c6aebfb6ac2366db50283d1b
SHA256e91d13722e31f9b06c5df3582cad1ea5b73547ce3dc08b12ed461f095aad48ee
SHA512d1c146d27bbf19362d6571e2865bb472ce4fe43dc535305615d92d6a2366f98533747a8a70a578d1f00199f716a61ce39fac5cab9dd67e9c044bc49e7343130e
-
Filesize
249B
MD5d70098cfca6ba75064303b0de71ed075
SHA1138da9d486b965cf86e3814799b081d43ec12b9d
SHA25673bb3c4a930d1d559807085f3e5f298a514bb509942f60d72fec4650d0927c57
SHA5128d9364467ebf22a007818d23f879715b09cf5d5acca274e7d4bef085543432fed3939fc4c0188739b0214d97c236c1f2f982c6d6e7aee70d6202705a83230623
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\MANIFEST-000007
Filesize118B
MD51c2107d4e3c80dadb6b349e42a419049
SHA1b38b68088655a66e4b2111ca3728182fa63f9d04
SHA2566c8a27990ff1de53260117dd8a16297f7412a238b2e508336745f3c051daedbe
SHA51266d8dcce40e3dc33ef7a9a5d79ecd299ad598bf411a038425a1ab526742d154cc48285bd530e99a6b79ed9fe4f296a1c829891992bb350161642d40d3f6ddde5
-
Filesize
14B
MD59eae63c7a967fc314dd311d9f46a45b7
SHA1caba9c2c93acfe0b9ceb9ab19b992b0fc19c71cf
SHA2564288925b0cf871c7458c22c46936efb0e903802feb991a0e1803be94ca6c251d
SHA512bed924bff236bf5b6ce1df1db82e86c935e5830a20d9d24697efd82ca331e30604db8d04b0d692ec8541ec6deb2225bcc7d805b79f2db5726642198ecf6348b8
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
86B
MD5961e3604f228b0d10541ebf921500c86
SHA16e00570d9f78d9cfebe67d4da5efe546543949a7
SHA256f7b24f2eb3d5eb0550527490395d2f61c3d2fe74bb9cb345197dad81b58b5fed
SHA512535f930afd2ef50282715c7e48859cc2d7b354ff4e6c156b94d5a2815f589b33189ffedfcaf4456525283e993087f9f560d84cfcf497d189ab8101510a09c472
-
Filesize
2B
MD599914b932bd37a50b983c5e7c90ae93b
SHA1bf21a9e8fbc5a3846fb05b4fa0859e0917b2202f
SHA25644136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a
SHA51227c74670adb75075fad058d5ceaf7b20c4e7786c83bae8a32f626f9782af34c9a33c2046ef60fd2a7878d378e29fec851806bbd9a67878f3a9f1cda4830763fd
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
4.2MB
MD5b5e061479580a67efbcb72642a1df59a
SHA1318d4d79cdef6de7dd1cc2e8dfcf93205b4fb6eb
SHA2562f70da1a79dbe2d0679b77a8999bd5cac1aa4133c8817a8be3b387cd5b7373ba
SHA51258fc0244bf1c9c9a027913d1c9798d026f128c4dff582735426755227d5cfa1be0e894fe83f2e45c055e394511d7939a4c542ff62b334615040302ccb18a1e40
-
Filesize
1.7MB
MD54582058f20847138c9cbefe536f2acbb
SHA1bf1caa7e2dbfacb84fe7faf74aa7e510953b0e00
SHA256ea1697a6da9ef6ca8b34f1de4767c706bf4a8db72080025190869ed73ff422bf
SHA512f2b71a7796bbd730f31275c855f216d6b292d0795a5d850255edfe68858ff6797d6bdd1d653e70d044b9954f4cc849ff394a067311d23e9272a64708dd15b35c
-
Filesize
1.7MB
MD5c2a3a6e9d10362c2e0951837ed901bb7
SHA1b6dd78adea28e0871ff3932a6dd49a0b99645c7a
SHA25603d8ff0cd875186621aacea4c511b772ceac1129c77cfae7cb2f968b6aae58f4
SHA512fd8f7f2e1916972f8f93d9834f3351e24f0baca8ab655731cef1fac4d31d195455e6fe5edbeb64925517dc4b7f59a778b1cd615904ffed363d4d9a5919afcd53
-
Filesize
2.6MB
MD50daf52fd4933512ee79db20cf6b9170b
SHA1aa28d030bb433401a469783a260d5e80b5fd7b06
SHA256e7372ac3bd94c72d9984703cc4194db15b59124db2a97c47f597c425982ae675
SHA5121d1a05393d94743e3f571e017de70b85372bbd5be0f09a51e26e6373bc4f9103956b0c6601bf931627590b4021effff44ef2b8c2600c435aedb85c56c45f0ca7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3.1MB
MD520442df12b76ac23966e74bc660afbde
SHA180f373c1993a5968631e5a9ef5a61293478926b8
SHA2564f7ef5147e70123670a51358fee29721a76267c5ff245817c56bb5918d193534
SHA5120effc3195ee23cecfa554fafca43dacd6a60780501e2946d13049cea8d078823990c6c5cbdb5b28ca66b00c48a43e0e4113e93c541d0f5791a6949228481677c