Analysis
-
max time kernel
144s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-11-2024 18:10
Static task
static1
Behavioral task
behavioral1
Sample
b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe
Resource
win7-20240903-en
General
-
Target
b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe
-
Size
3.1MB
-
MD5
450f5d36c348b3da6be54ccf321c7901
-
SHA1
9d2c71e3f3cd475051596f96782ea6378b0acb64
-
SHA256
b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90
-
SHA512
401b3fa84ca126b1b63b7fcc6c1ec66c81e9e60f988696248df6e6af06583f576f31300db750e2cb81a4d36b31036f135f14c221784bf144b11aac3e61ed95c2
-
SSDEEP
49152:S8aDdHEp7c0reuE7+vQSCYrimMFzBprUHh/J3egFW173X1V:PaDep7c0CuEmQ/Yri7BpQDubjlV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/696-149-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7758de5f8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7758de5f8e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 7758de5f8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7758de5f8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7758de5f8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7758de5f8e.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d9692962b4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 086ffe6437.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8e52468d3a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7758de5f8e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2532 chrome.exe 2664 chrome.exe 2896 chrome.exe 2012 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8e52468d3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7758de5f8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d9692962b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 086ffe6437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 086ffe6437.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8e52468d3a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7758de5f8e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d9692962b4.exe -
Executes dropped EXE 7 IoCs
pid Process 2116 skotes.exe 588 build.exe 2160 SKOblik.exe 696 d9692962b4.exe 760 086ffe6437.exe 1600 8e52468d3a.exe 2232 7758de5f8e.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine d9692962b4.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 086ffe6437.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 8e52468d3a.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 7758de5f8e.exe -
Loads dropped DLL 11 IoCs
pid Process 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe 2116 skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 7758de5f8e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7758de5f8e.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\086ffe6437.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006486001\\086ffe6437.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\8e52468d3a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006487001\\8e52468d3a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\7758de5f8e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006489001\\7758de5f8e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 2116 skotes.exe 696 d9692962b4.exe 760 086ffe6437.exe 1600 8e52468d3a.exe 2232 7758de5f8e.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
resource yara_rule behavioral1/files/0x0008000000016d22-48.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9692962b4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 086ffe6437.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8e52468d3a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7758de5f8e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d9692962b4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d9692962b4.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 086ffe6437.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 086ffe6437.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 086ffe6437.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 2116 skotes.exe 696 d9692962b4.exe 760 086ffe6437.exe 1600 8e52468d3a.exe 2232 7758de5f8e.exe 2232 7758de5f8e.exe 2232 7758de5f8e.exe 2532 chrome.exe 2532 chrome.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2232 7758de5f8e.exe Token: SeShutdownPrivilege 2532 chrome.exe Token: SeShutdownPrivilege 2532 chrome.exe -
Suspicious use of FindShellTrayWindow 35 IoCs
pid Process 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe 2532 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2380 wrote to memory of 2116 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 30 PID 2380 wrote to memory of 2116 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 30 PID 2380 wrote to memory of 2116 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 30 PID 2380 wrote to memory of 2116 2380 b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe 30 PID 2116 wrote to memory of 588 2116 skotes.exe 32 PID 2116 wrote to memory of 588 2116 skotes.exe 32 PID 2116 wrote to memory of 588 2116 skotes.exe 32 PID 2116 wrote to memory of 588 2116 skotes.exe 32 PID 2116 wrote to memory of 2160 2116 skotes.exe 35 PID 2116 wrote to memory of 2160 2116 skotes.exe 35 PID 2116 wrote to memory of 2160 2116 skotes.exe 35 PID 2116 wrote to memory of 2160 2116 skotes.exe 35 PID 2116 wrote to memory of 696 2116 skotes.exe 36 PID 2116 wrote to memory of 696 2116 skotes.exe 36 PID 2116 wrote to memory of 696 2116 skotes.exe 36 PID 2116 wrote to memory of 696 2116 skotes.exe 36 PID 2116 wrote to memory of 760 2116 skotes.exe 37 PID 2116 wrote to memory of 760 2116 skotes.exe 37 PID 2116 wrote to memory of 760 2116 skotes.exe 37 PID 2116 wrote to memory of 760 2116 skotes.exe 37 PID 2116 wrote to memory of 1600 2116 skotes.exe 38 PID 2116 wrote to memory of 1600 2116 skotes.exe 38 PID 2116 wrote to memory of 1600 2116 skotes.exe 38 PID 2116 wrote to memory of 1600 2116 skotes.exe 38 PID 2116 wrote to memory of 2920 2116 skotes.exe 39 PID 2116 wrote to memory of 2920 2116 skotes.exe 39 PID 2116 wrote to memory of 2920 2116 skotes.exe 39 PID 2116 wrote to memory of 2920 2116 skotes.exe 39 PID 2116 wrote to memory of 2232 2116 skotes.exe 40 PID 2116 wrote to memory of 2232 2116 skotes.exe 40 PID 2116 wrote to memory of 2232 2116 skotes.exe 40 PID 2116 wrote to memory of 2232 2116 skotes.exe 40 PID 696 wrote to memory of 2532 696 d9692962b4.exe 41 PID 696 wrote to memory of 2532 696 d9692962b4.exe 41 PID 696 wrote to memory of 2532 696 d9692962b4.exe 41 PID 696 wrote to memory of 2532 696 d9692962b4.exe 41 PID 2532 wrote to memory of 2932 2532 chrome.exe 42 PID 2532 wrote to memory of 2932 2532 chrome.exe 42 PID 2532 wrote to memory of 2932 2532 chrome.exe 42 PID 2532 wrote to memory of 448 2532 chrome.exe 43 PID 2532 wrote to memory of 448 2532 chrome.exe 43 PID 2532 wrote to memory of 448 2532 chrome.exe 43 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45 PID 2532 wrote to memory of 568 2532 chrome.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe"C:\Users\Admin\AppData\Local\Temp\b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\1006262001\build.exe"C:\Users\Admin\AppData\Local\Temp\1006262001\build.exe"3⤵
- Executes dropped EXE
PID:588
-
-
C:\Users\Admin\AppData\Local\Temp\1006418001\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\1006418001\SKOblik.exe"3⤵
- Executes dropped EXE
PID:2160
-
-
C:\Users\Admin\AppData\Local\Temp\1006449001\d9692962b4.exe"C:\Users\Admin\AppData\Local\Temp\1006449001\d9692962b4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef7469758,0x7fef7469768,0x7fef74697785⤵PID:2932
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:448
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1124 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:25⤵PID:568
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1500 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:85⤵PID:920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1576 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:85⤵PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2296 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2308 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1540 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:25⤵PID:960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9222 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1536 --field-trial-handle=1348,i,6938560275527249278,8749358476495009829,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1006486001\086ffe6437.exe"C:\Users\Admin\AppData\Local\Temp\1006486001\086ffe6437.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\1006487001\8e52468d3a.exe"C:\Users\Admin\AppData\Local\Temp\1006487001\8e52468d3a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\1006489001\7758de5f8e.exe"C:\Users\Admin\AppData\Local\Temp\1006489001\7758de5f8e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2232
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\000007.dbtmp
Filesize16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
41.2MB
MD57abd9cf3c1c7b8e12e309a517a1d64c0
SHA163fc374e4498dedb181bb37aad0dc14813e45ba4
SHA256dd11a80576e2d535d1ffffeb53f9e72466e32ef39d833f43cd6e6f11fc365ebb
SHA5121c0d1a539e19edfcda7cd346fc2471988888293b52c625e29ce1a317c928ce97e44fcbcabb1bc4eda5a65b82d9e84eba4a2e864073bbcd3c3ae773693237544f
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
4.2MB
MD5b5e061479580a67efbcb72642a1df59a
SHA1318d4d79cdef6de7dd1cc2e8dfcf93205b4fb6eb
SHA2562f70da1a79dbe2d0679b77a8999bd5cac1aa4133c8817a8be3b387cd5b7373ba
SHA51258fc0244bf1c9c9a027913d1c9798d026f128c4dff582735426755227d5cfa1be0e894fe83f2e45c055e394511d7939a4c542ff62b334615040302ccb18a1e40
-
Filesize
1.8MB
MD5b10c5598499dd5bc4403334079df1b30
SHA10cc8e7bf766694154e4b4d6458cd403e05587bed
SHA256b01b180518a67969040e7cbbacf11a83a5035bd5d961e28309add02d0dfe9ac6
SHA51280ff73b3f94d802f339009ddbe34cc1d6479b5a0aa90920533617b2e408f2442905e91bccbd5ad524c48c3373c923bc5aa0006af7ef53d87f3f15450ea2d2854
-
Filesize
1.7MB
MD5f6dd3195d9f8504e2e8cad8d7dfeebd2
SHA1f8b3784d88c29467968c5404f836a02b1d746dd0
SHA25616583a94054273cf5ffe92afe1f9242ce2ee91ed22dd7a6db4565a1fdf905431
SHA51255768ef242f08141e1296ebabfcae3b1af68f8b8c5bda63fc6147d7f6634f73e4f3a13c367c3480864a0c44c0de455dfce0125cf40cdbe75a35369baf8aa5b9a
-
Filesize
2.7MB
MD56fd056b79a786d171988a88e7668b2cc
SHA1fbb59a6d0f04984bda37b153b6f59a91cfd86413
SHA2561c676304ebcc60bbf8ad5b59c1730d304400dda0d37534268b475c24b68886b6
SHA5129faf0809f810db6c709480692acfb7cbe49a871945ed957c98d06e39f296eaa3ccfbe50b3755d9d7ac2089631caf95f60f31ab9919ab8145d1c4237eb0ab0c60
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
3.1MB
MD5450f5d36c348b3da6be54ccf321c7901
SHA19d2c71e3f3cd475051596f96782ea6378b0acb64
SHA256b6f12e1681c93ba7210b921f2c7b8ca2a0ef662b0545f60821e1ef7ccc13cd90
SHA512401b3fa84ca126b1b63b7fcc6c1ec66c81e9e60f988696248df6e6af06583f576f31300db750e2cb81a4d36b31036f135f14c221784bf144b11aac3e61ed95c2