Analysis
-
max time kernel
141s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-11-2024 11:56
Static task
static1
Behavioral task
behavioral1
Sample
bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe
Resource
win7-20240903-en
General
-
Target
bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe
-
Size
1.7MB
-
MD5
a8916b1db51981824cf0545df6864fb9
-
SHA1
1faea8faf266fd74109256096cc1dce4acb9298b
-
SHA256
bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8
-
SHA512
df9ba0e339eb25f2cffe7bd17d9b50a6407f89f8580c5e1f5f5696308780ee22cbd8c3d7d4a060a4fab9036b4964ba66b2c5e9ff02e93b2dd870cf6f7b4bf5ed
-
SSDEEP
24576:iyO0WNSipzzzKsELqntGnCp3o4J1LqwbbVtFMDjJnucPk5XJt6mtJC:i0e746tyoEwOucPk5XJ8
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 2bd3fa05ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2bd3fa05ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2bd3fa05ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2bd3fa05ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2bd3fa05ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2bd3fa05ca.exe -
NetSupport
NetSupport is a remote access tool sold as a legitimate system administration software.
-
Netsupport family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 40c1c007b0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4b792aedb2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2bd3fa05ca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ DocumentsCBKJKJDBFI.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1596 chrome.exe 1392 chrome.exe 1920 chrome.exe 2884 chrome.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion DocumentsCBKJKJDBFI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion DocumentsCBKJKJDBFI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 40c1c007b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4b792aedb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2bd3fa05ca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 40c1c007b0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4b792aedb2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2bd3fa05ca.exe -
Executes dropped EXE 8 IoCs
pid Process 2620 DocumentsCBKJKJDBFI.exe 2288 skotes.exe 2436 babababa.exe 2820 40c1c007b0.exe 1364 4b792aedb2.exe 2836 2bd3fa05ca.exe 740 123.exe 2144 bild.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine DocumentsCBKJKJDBFI.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 40c1c007b0.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 4b792aedb2.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 2bd3fa05ca.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe -
Loads dropped DLL 17 IoCs
pid Process 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 2632 cmd.exe 2620 DocumentsCBKJKJDBFI.exe 2288 skotes.exe 2288 skotes.exe 2288 skotes.exe 2288 skotes.exe 2288 skotes.exe 2288 skotes.exe 2288 skotes.exe 2380 cmd.exe 2144 bild.exe 2144 bild.exe 2144 bild.exe 2144 bild.exe 2144 bild.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 2bd3fa05ca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2bd3fa05ca.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Netstat = "C:\\Users\\Public\\Public\\Videos\\Video\\bild.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\40c1c007b0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006657001\\40c1c007b0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\4b792aedb2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006658001\\4b792aedb2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\2bd3fa05ca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1006660001\\2bd3fa05ca.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 2620 DocumentsCBKJKJDBFI.exe 2288 skotes.exe 2820 40c1c007b0.exe 1364 4b792aedb2.exe 2836 2bd3fa05ca.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job DocumentsCBKJKJDBFI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 40c1c007b0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4b792aedb2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bild.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DocumentsCBKJKJDBFI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2bd3fa05ca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 2884 chrome.exe 2884 chrome.exe 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 2620 DocumentsCBKJKJDBFI.exe 2288 skotes.exe 2820 40c1c007b0.exe 1364 4b792aedb2.exe 2836 2bd3fa05ca.exe 2836 2bd3fa05ca.exe 2836 2bd3fa05ca.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeShutdownPrivilege 2884 chrome.exe Token: SeDebugPrivilege 2836 2bd3fa05ca.exe Token: SeSecurityPrivilege 2144 bild.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2884 chrome.exe 2620 DocumentsCBKJKJDBFI.exe 2144 bild.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 944 wrote to memory of 2884 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 32 PID 944 wrote to memory of 2884 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 32 PID 944 wrote to memory of 2884 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 32 PID 944 wrote to memory of 2884 944 bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe 32 PID 2884 wrote to memory of 2556 2884 chrome.exe 33 PID 2884 wrote to memory of 2556 2884 chrome.exe 33 PID 2884 wrote to memory of 2556 2884 chrome.exe 33 PID 2884 wrote to memory of 2044 2884 chrome.exe 34 PID 2884 wrote to memory of 2044 2884 chrome.exe 34 PID 2884 wrote to memory of 2044 2884 chrome.exe 34 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2756 2884 chrome.exe 36 PID 2884 wrote to memory of 2428 2884 chrome.exe 37 PID 2884 wrote to memory of 2428 2884 chrome.exe 37 PID 2884 wrote to memory of 2428 2884 chrome.exe 37 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38 PID 2884 wrote to memory of 2276 2884 chrome.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe"C:\Users\Admin\AppData\Local\Temp\bc6ce7042e0b92a139c10c803493adc1c87bddb4fe2f9f44a9f2a052833960e8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory="Default"2⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6809758,0x7fef6809768,0x7fef68097783⤵PID:2556
-
-
C:\Windows\system32\ctfmon.exectfmon.exe3⤵PID:2044
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:23⤵PID:2756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1484 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:83⤵PID:2428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1656 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:83⤵PID:2276
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2104 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2336 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1392
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1624 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:23⤵PID:2400
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1280 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:13⤵
- Uses browser remote debugging
PID:1920
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3600 --field-trial-handle=1380,i,6290896537493498883,12943884722611842898,131072 /prefetch:83⤵PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\DocumentsCBKJKJDBFI.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Users\Admin\DocumentsCBKJKJDBFI.exe"C:\Users\Admin\DocumentsCBKJKJDBFI.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\1006652001\babababa.exe"C:\Users\Admin\AppData\Local\Temp\1006652001\babababa.exe"5⤵
- Executes dropped EXE
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\1006657001\40c1c007b0.exe"C:\Users\Admin\AppData\Local\Temp\1006657001\40c1c007b0.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2820
-
-
C:\Users\Admin\AppData\Local\Temp\1006658001\4b792aedb2.exe"C:\Users\Admin\AppData\Local\Temp\1006658001\4b792aedb2.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1364
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\1006660001\2bd3fa05ca.exe"C:\Users\Admin\AppData\Local\Temp\1006660001\2bd3fa05ca.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\1006661001\123.exe"C:\Users\Admin\AppData\Local\Temp\1006661001\123.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:740 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Public\Public\Videos\Video\netsup.bat" "6⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Netstat" /t REG_SZ /F /D "C:\Users\Public\Public\Videos\Video\bild.exe"7⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Users\Public\Public\Videos\Video\bild.exeC:\Users\Public\Public\Videos\Video\bild.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2144
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
33.3MB
MD58fb77810c61e160a657298815346996e
SHA14268420571bb1a858bc6a9744c0742d6fd738a83
SHA256a0840c581f8f1d606fdc43bc98bd386755433bf1fb36647ecf2165eea433ff66
SHA512b0d0aea14bfbb5dfa17536b1669d85fc1325140f6a0176ae1c04870efa3adc902d5755f0df00d305f01120960e95bfc40c37c7519ec2827797ebaa95097cfeb2
-
Filesize
1.8MB
MD50cc8c789f5758953c1ab550af042006d
SHA161a534d7f59a4a69e9a12174a1d1ab11278c62db
SHA256aec914b9ba6597d47477ccc5e5f179ec830127b7d9eb8409fc7bff93d46ede7f
SHA5121e7baa28c0b046114d55df43963710f4e4805cead2c7debc10c573d592a7e23131e791b1a482ec32bbc456514bf2e79ae22e7d2747948e68686212b3805b7ce5
-
Filesize
1.7MB
MD592f63d65d300b1eb836e62251a754767
SHA1f56c26a6e106bd720fe5424aad9d05e449f39a31
SHA25644205e1c63b9dd78eb35ae46b12c02aba936367c40fd1777f07e5d7c773ac3c2
SHA512683bf154a8c64d86862906634ccbdca3d692a3fcc342ff514c2d9c094a2b885a50e52b46a6924a13457a2e326945742a60507a8d51883cfc32f469b0ab4d4db3
-
Filesize
2.7MB
MD55c45e2f4790f034c21ec068d7126c679
SHA1a28dd151cada8355bca968cb145b6543c73c04a8
SHA256a8c44ce101d6b49b9a7415a7616ce5e67ab7143e88cdf73c5df63c3fb6ab628f
SHA5125130687319a0c16a8cc846bd476d8d6f9fa59df262f208373ee87c750549246d9cffdbfb5d06378de02d96dee84c5b1db8cafe64883498d1642ba314669723f6
-
Filesize
2.0MB
MD5166d71e145b2c802acd2b0a07e070bad
SHA11c84d2e573e7096040fbe6e950fbff764aa11096
SHA25633b22fce68d5d7bd08e86b8506c50bdfcd38c26db5983864e8d33bdf62f53272
SHA5125137efaeda15554cf5b8ff68516d91b9cb3e960b85970f535e8735b1705f62cb390ffef4c7b964ed33764cd3b772aaca0ac1468ec67abe7fd2de9ddf2465f6e4
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
320KB
MD52d3b207c8a48148296156e5725426c7f
SHA1ad464eb7cf5c19c8a443ab5b590440b32dbc618f
SHA256edfe2b923bfb5d1088de1611401f5c35ece91581e71503a5631647ac51f7d796
SHA51255c791705993b83c9b26a8dbd545d7e149c42ee358ecece638128ee271e85b4fdbfd6fbae61d13533bf39ae752144e2cc2c5edcda955f18c37a785084db0860c
-
Filesize
755KB
MD50e37fbfa79d349d672456923ec5fbbe3
SHA14e880fc7625ccf8d9ca799d5b94ce2b1e7597335
SHA2568793353461826fbd48f25ea8b835be204b758ce7510db2af631b28850355bd18
SHA5122bea9bd528513a3c6a54beac25096ee200a4e6ccfc2a308ae9cfd1ad8738e2e2defd477d59db527a048e5e9a4fe1fc1d771701de14ef82b4dbcdc90df0387630
-
Filesize
257B
MD57067af414215ee4c50bfcd3ea43c84f0
SHA1c331d410672477844a4ca87f43a14e643c863af9
SHA2562050cc232710a2ea6a207bc78d1eac66a4042f2ee701cdfeee5de3ddcdc31d12
SHA51217b888087192bcea9f56128d0950423b1807e294d1c4f953d1bf0f5bd08e5f8e35afeee584ebf9233bfc44e0723db3661911415798159ac118c8a42aaf0b902f
-
Filesize
3.6MB
MD500587238d16012152c2e951a087f2cc9
SHA1c4e27a43075ce993ff6bb033360af386b2fc58ff
SHA25663aa18c32af7144156e7ee2d5ba0fa4f5872a7deb56894f6f96505cbc9afe6f8
SHA512637950a1f78d3f3d02c30a49a16e91cf3dfccc59104041876789bd7fdf9224d187209547766b91404c67319e13d1606da7cec397315495962cbf3e2ccd5f1226
-
Filesize
700B
MD55778abd7cf2e8039239cd5982281d61a
SHA19aa6e80a115343a100031c9473fc6a071eefd07e
SHA2560bd4dc8b66c588f715b117021ef14c959e396f5cc6041f885f0d121401bc267a
SHA512dc01567d881d48554732747a286ac9a95ef095b4cb860f384b85636b160778c9efe366f53550b74d9ddf504b293f03bbb252e5247f03490e4567ad142def6e0a
-
Filesize
311B
MD54db329a7ba03593c3d02c5e80068f82a
SHA170b77611f440dac81778f54a316e811f3b3c63a4
SHA2567182655a9f8489e5b761c16192f3de1662114f7aa9938f87e0062f8859dae7f5
SHA5126b34fc8000a457f44befb03a8153d7e77ca0b8f44705ab7df2fed3f52599a9172e9a866938986a36b4376c99260b5d03b5496dd605dbfbbd7bf301fe72d31f83
-
Filesize
32KB
MD5dcde2248d19c778a41aa165866dd52d0
SHA17ec84be84fe23f0b0093b647538737e1f19ebb03
SHA2569074fd40ea6a0caa892e6361a6a4e834c2e51e6e98d1ffcda7a9a537594a6917
SHA512c5d170d420f1aeb9bcd606a282af6e8da04ae45c83d07faaacb73ff2e27f4188b09446ce508620124f6d9b447a40a23620cfb39b79f02b04bb9e513866352166
-
Filesize
18KB
MD5a0b9388c5f18e27266a31f8c5765b263
SHA1906f7e94f841d464d4da144f7c858fa2160e36db
SHA256313117e723dda6ea3911faacd23f4405003fb651c73de8deff10b9eb5b4a058a
SHA5126051a0b22af135b4433474dc7c6f53fb1c06844d0a30ed596a3c6c80644df511b023e140c4878867fa2578c79695fac2eb303aea87c0ecfc15a4ad264bd0b3cd
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
3.1MB
MD503b9e85b193c6271f2999e206aa72387
SHA1269750ad93e9ea766348f934720c0e1b56e7a8dc
SHA256dab1b476f15d7654c295fccc68147ce309ae110e446d2ca730eeae4f3f0244fa
SHA512bb6d7e7c9b606233e90d401e7515d98dc742543528081f80e3f9a8064ffedcbc7f2aadb1965efccb76b56ed7ed1378a312ba4a9e79327bf1418e46f28bf3dfef
-
Filesize
103KB
MD58d9709ff7d9c83bd376e01912c734f0a
SHA1e3c92713ce1d7eaa5e2b1fabeb06cdc0bb499294
SHA25649a568f8ac11173e3a0d76cff6bc1d4b9bdf2c35c6d8570177422f142dcfdbe3
SHA512042ad89ed2e15671f5df67766d11e1fa7ada8241d4513e7c8f0d77b983505d63ebfb39fefa590a2712b77d7024c04445390a8bf4999648f83dbab6b0f04eb2ee