Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 08:44
Static task
static1
Behavioral task
behavioral1
Sample
87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe
Resource
win7-20241010-en
General
-
Target
87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe
-
Size
1.8MB
-
MD5
dee78d05a34f6d99efe46fc1630c95c8
-
SHA1
ebf206519c7214f96d3a0efbc03057ffa74819e9
-
SHA256
87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738
-
SHA512
9c69bf8fc353143300635a80cf9e09dc1fb483d6806f15d67731dc42875edb37ade1fbf040462255b43417bf44f8381c9d1368de5f619ab46919ecce5b3e24a8
-
SSDEEP
24576:nCiqEyM7m/68DVhiJirFosZGu3d5OkegnDGlH3DJwPCngfEjMjIT/W56WPI:n8EyM7mi8SQosZGuuAaHzJwPJs4jnP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fc2a5fc0b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fc2a5fc0b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection fc2a5fc0b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fc2a5fc0b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fc2a5fc0b7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fc2a5fc0b7.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 279db13164.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fc2a5fc0b7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 279db13164.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 279db13164.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fc2a5fc0b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fc2a5fc0b7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 6 IoCs
pid Process 1632 skotes.exe 5104 279db13164.exe 4588 8aeb88be4e.exe 1444 fc2a5fc0b7.exe 5744 skotes.exe 4924 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 279db13164.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine fc2a5fc0b7.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fc2a5fc0b7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features fc2a5fc0b7.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\279db13164.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007113001\\279db13164.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8aeb88be4e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007115001\\8aeb88be4e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fc2a5fc0b7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007116001\\fc2a5fc0b7.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b94-60.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 1632 skotes.exe 5104 279db13164.exe 1444 fc2a5fc0b7.exe 5744 skotes.exe 4924 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc2a5fc0b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 279db13164.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8aeb88be4e.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4628 taskkill.exe 2324 taskkill.exe 3400 taskkill.exe 4368 taskkill.exe 4048 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 1632 skotes.exe 1632 skotes.exe 5104 279db13164.exe 5104 279db13164.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 1444 fc2a5fc0b7.exe 1444 fc2a5fc0b7.exe 1444 fc2a5fc0b7.exe 1444 fc2a5fc0b7.exe 1444 fc2a5fc0b7.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 5744 skotes.exe 5744 skotes.exe 4924 skotes.exe 4924 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4628 taskkill.exe Token: SeDebugPrivilege 2324 taskkill.exe Token: SeDebugPrivilege 3400 taskkill.exe Token: SeDebugPrivilege 4368 taskkill.exe Token: SeDebugPrivilege 4048 taskkill.exe Token: SeDebugPrivilege 1444 fc2a5fc0b7.exe Token: SeDebugPrivilege 4800 firefox.exe Token: SeDebugPrivilege 4800 firefox.exe Token: SeDebugPrivilege 4800 firefox.exe Token: SeDebugPrivilege 4800 firefox.exe Token: SeDebugPrivilege 4800 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4588 8aeb88be4e.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4588 8aeb88be4e.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4800 firefox.exe 4588 8aeb88be4e.exe 4588 8aeb88be4e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4800 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1912 wrote to memory of 1632 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 86 PID 1912 wrote to memory of 1632 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 86 PID 1912 wrote to memory of 1632 1912 87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe 86 PID 1632 wrote to memory of 5104 1632 skotes.exe 93 PID 1632 wrote to memory of 5104 1632 skotes.exe 93 PID 1632 wrote to memory of 5104 1632 skotes.exe 93 PID 1632 wrote to memory of 4588 1632 skotes.exe 101 PID 1632 wrote to memory of 4588 1632 skotes.exe 101 PID 1632 wrote to memory of 4588 1632 skotes.exe 101 PID 4588 wrote to memory of 4628 4588 8aeb88be4e.exe 102 PID 4588 wrote to memory of 4628 4588 8aeb88be4e.exe 102 PID 4588 wrote to memory of 4628 4588 8aeb88be4e.exe 102 PID 4588 wrote to memory of 2324 4588 8aeb88be4e.exe 104 PID 4588 wrote to memory of 2324 4588 8aeb88be4e.exe 104 PID 4588 wrote to memory of 2324 4588 8aeb88be4e.exe 104 PID 4588 wrote to memory of 3400 4588 8aeb88be4e.exe 106 PID 4588 wrote to memory of 3400 4588 8aeb88be4e.exe 106 PID 4588 wrote to memory of 3400 4588 8aeb88be4e.exe 106 PID 4588 wrote to memory of 4368 4588 8aeb88be4e.exe 108 PID 4588 wrote to memory of 4368 4588 8aeb88be4e.exe 108 PID 4588 wrote to memory of 4368 4588 8aeb88be4e.exe 108 PID 4588 wrote to memory of 4048 4588 8aeb88be4e.exe 110 PID 4588 wrote to memory of 4048 4588 8aeb88be4e.exe 110 PID 4588 wrote to memory of 4048 4588 8aeb88be4e.exe 110 PID 1632 wrote to memory of 1444 1632 skotes.exe 112 PID 1632 wrote to memory of 1444 1632 skotes.exe 112 PID 1632 wrote to memory of 1444 1632 skotes.exe 112 PID 4588 wrote to memory of 408 4588 8aeb88be4e.exe 113 PID 4588 wrote to memory of 408 4588 8aeb88be4e.exe 113 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 408 wrote to memory of 4800 408 firefox.exe 114 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 PID 4800 wrote to memory of 2128 4800 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe"C:\Users\Admin\AppData\Local\Temp\87d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1007113001\279db13164.exe"C:\Users\Admin\AppData\Local\Temp\1007113001\279db13164.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\1007115001\8aeb88be4e.exe"C:\Users\Admin\AppData\Local\Temp\1007115001\8aeb88be4e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2130cab6-aa66-4cff-b37a-9cc39fc45548} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" gpu6⤵PID:2128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {161afdfa-82a4-43fe-a3f3-50bf01143cf7} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" socket6⤵PID:2568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3088 -childID 1 -isForBrowser -prefsHandle 3016 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1f4ec5ea-4c64-462c-9c30-d3cc582a6c38} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" tab6⤵PID:4640
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3960 -childID 2 -isForBrowser -prefsHandle 3952 -prefMapHandle 3948 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7a30806-85d5-40b0-941c-595a68f1b456} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" tab6⤵PID:2548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4860 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4764 -prefMapHandle 4756 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {501dce09-b415-4552-9fc1-324e5db56f9e} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" utility6⤵
- Checks processor information in registry
PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 3 -isForBrowser -prefsHandle 5520 -prefMapHandle 5516 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {66b704fe-7865-4bb1-8157-d52521b418fc} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" tab6⤵PID:2024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5660 -childID 4 -isForBrowser -prefsHandle 5648 -prefMapHandle 5652 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7a60408-4f26-4ef1-a1dd-05d2de5d1bde} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" tab6⤵PID:1996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5848 -childID 5 -isForBrowser -prefsHandle 5856 -prefMapHandle 5860 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91ed3dc5-65ee-413a-bd7d-06f17bd1ca49} 4800 "\\.\pipe\gecko-crash-server-pipe.4800" tab6⤵PID:216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007116001\fc2a5fc0b7.exe"C:\Users\Admin\AppData\Local\Temp\1007116001\fc2a5fc0b7.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5744
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4924
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD59b0901d2ec6a9dfa83129dd77f096942
SHA103d6e4da41fc0396edbe876442e226bf904b066f
SHA256d1df6345edb2d8440b81c60de1cc683680160dc905a30b150e98c14b93689135
SHA51201f6aaa8db892f44a1188d25687f37ca19a6ee5f88a075f65882aae980b90be1d1cb71910b59ac6d5bbbfef85ed845de5a408f0bf97992a92c4109408ae44109
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5746f58dd93b5cd3910124d31a1f2788d
SHA1392fa15dca1adc1fec152a29c2c990e635295df5
SHA2569e3e23a916fba5ee423229a87d089ea2fa483297a0e7e53275c8a8482b322bcf
SHA5124194680b8419f3a17fefa9f0f11525119e6414b51552c54cc19d2c24410d4fd7dc0e5f969aca794eece07334c4394b97e68d36ffd088c78bfd78bcaba9a072c2
-
Filesize
1.7MB
MD52fe2ab5b511de6ef48e3eba0378f3e12
SHA1c350d71c99c8c079714e71c219c706c6716a22aa
SHA256ab2e92bf1d70567a32aef956b7d64cbe4d49dadf779fc6d455674fab35509b14
SHA5124beb110952f7f3d6f351149448344f0e5918694bfa3fa958e08690999e16f270abd32100e2d844c5a13564e4c8fd664d17882979e6ca567111983ef62ee4768e
-
Filesize
516KB
MD5a234706c76a45685260134c70d03ecc0
SHA1443fc90b10efdba5b562bedbedab66301b294479
SHA256110a05b375c9b5e3acc2e96933f526e546ec2faf869b682fb9ecd65e42b933b1
SHA512ed9484e21c13e86b49dc3afc6423d1afb80eb78233e92767f41efb6264fcd33df138b104e0a7c6fecf82eda70f0b95414fb310a8a172a140698e17eb3059d542
-
Filesize
900KB
MD55ce51bebf5df5616c0afad430b705cda
SHA197b05e3b842ea60a341e600c12110092a27240cc
SHA25665177fb5a41a621039697bb1c2559cfb544bead0f3a91722008f425fbe89e261
SHA512c141267589f896649c97dae327c98e2abfc5de85c06917a00062acc7bb4e42da94085ea1f6b70f6c8dba4ef1725ae9bf0b64747792f80c824d99eef1f23e7ee8
-
Filesize
2.6MB
MD5bea1589178b4eda7c5b15d47b076f6bd
SHA181a654fe6ca77c26d0c87d9f8fe1786c4ee4582d
SHA256336b2204ee1f34c545ac54145a9db9f548ee478708fe1bc22c679fb037063068
SHA512d8ed0c2b19b94aeb4aed0d2e7525cb3eb8289b9da0d4df8c1b24340060976233af90861fca9ecf259c7cbe40775d1f8fa6ff814bdc542abd9381497ee60d9d98
-
Filesize
1.8MB
MD5dee78d05a34f6d99efe46fc1630c95c8
SHA1ebf206519c7214f96d3a0efbc03057ffa74819e9
SHA25687d95f8b48b3ecb117b84e6963e991c3e66cebd487bbd6de7811b5db5833f738
SHA5129c69bf8fc353143300635a80cf9e09dc1fb483d6806f15d67731dc42875edb37ade1fbf040462255b43417bf44f8381c9d1368de5f619ab46919ecce5b3e24a8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD5cdeca24efe55ad74354e10e11ba69efe
SHA1430af14da8301723ccc152c00065f3fdec8bd617
SHA2567e56f78c384338f24c1e02bbb040dd51108172cc5765d9255609d73f89d97380
SHA512999ba1047f0b55f1cd851c9c36aa4b3d473c7d29b770dc47237b057bd0e4845a433384a53c8d4bf651640237a4538e64a8d7d6ea019da8528ff218bf5bb6c83e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5ea37a21fe1e24a03d5c56b6f444250c5
SHA1639d5c5311570a1cf8959c4fe239fe4589cf8978
SHA2568716f9daf693d48c01a80e3c392ad8b6e0875bc80f64774b2d081d809299706a
SHA5125ce0f838824d7ee203820e766901c3a298ab700fc9d0af5fd2b1fa644b1c52005750fe74eb9939c6e9b765aee8be87a3f1c187992a663eded18b4fc785894094
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d3d3535ef99604dcaa3f16e26ff533e6
SHA116d4db158b1e412d1628be400070bb740cbf8289
SHA256a837482e6a3c0f8c87d99bb4d2ecf573552887e4da3f206ee5569cff64a63c77
SHA512c4861ff62a581f81fd043de3f8b40b01a16c9cfe149f8ad2c53225cf3ea6e238e9be86164f9fe89db8492958f8d4e608c24b8042985d1a86c255f97c02b0bf62
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5dbacbde848afbc1892158b50877f739b
SHA1d733c241094379c2f7060669546c8a3c8d61ca0d
SHA256fbba8de13c89a38e237dc0c3605c818faa714f5d3348cdf4add2a468ccebb06f
SHA512c131d280937d95f772409a65d75e611f5c0d28ec0ab314e6f8b65a98407678d12461d89373120ddbbf5780cc925ee037f9afe3a3d64ea1ce822ca779002cf354
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5612bf611b6d76c820e01f08dddfb17e1
SHA1c9036b5ece9efda6207d0652f75df3766d25f2cd
SHA25674a93295d06369c85153c821b24d6c3e99b478320741d7440fe92d3e01d1df4a
SHA5127bcc25e08f46b7ca665dc5af49cd25c87fd473baab095c6552643b93b9dffd0cb23d9a0d7804994febb56ce31a04fabb3fbad385b6e8ff9df26ddd3824e1ceca
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51fd9d71bdffcc7694cc303b0f71902da
SHA16eb014df1c3cb0352e37e02e58a6d5d2c747d230
SHA256d8c5444ef7462b447b1167eced2f160b569494d75dcbd94119da97384f25c7db
SHA51258ef73ef1a0b4b63640a5bd1848c12befa172640a9586bc308df2bc538fb21a3de7fb337e29eba44a8aaa626b62e6b01c29b1527b70938eb26f45dee63168f63
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0b4f0400-dfed-48cb-894e-04bea106478e
Filesize24KB
MD551244348bb08c2a53eff7af012c88389
SHA1ec31374a0dbe0cc1fad4628b91ee59ac1eb83d9b
SHA25654ca5d6b8628a9769b332f83ab2039b0bf50dfa9214abbcb418b46df2ecea556
SHA512f620402320b43acb0ee4ac36d19d1203a34bad05f15d3db371dab021de0a8d400a796fb6b95bcef75034cd57303e860440d2efa20b991008b6de4870e0e2f089
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\3ee860db-3843-43b0-9ab3-3e2778c921e0
Filesize671B
MD542f71cc932defde884e0dcf6d389681a
SHA1070994f450cd5cebfacc8a55ac205fe704d7792f
SHA256a4c9ab85652bc5bcff3dd3ad79aa1d516661d29541fc195cfd81f20f20276e8d
SHA5127caa748cf737739467b9f79b7386cfe6cde9c383ea1f24c491a9000b5d1da4e3c80b70e42fca6d2015fbab58823cf18a1a71003b04b12affbe91b6193b46021d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\b61842e8-a679-4636-bb73-9a9384f97989
Filesize982B
MD56bd26556383a3e7e9c07d030e9831703
SHA1d0680fa2fb94ba8d8263bf1506c0fa676a7dfe3e
SHA256298c8bdc7db018979e71716a401a5e42f3c07d674edd6d4789dab59b1a3d0c20
SHA5121d5629b6d10588c467d0f4721eae313534800d6c5785e8a0980f798d47a702f7ad90166731331c81096847c3d152c86b705365644e464359bcf8d056ec7285c2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
16KB
MD519f9b35d0b63549d5c5b506a418d585c
SHA1e2b1bc62c8f58462dca0ad5e228d0f6d274f6896
SHA256a533dc330a0595815e078e5a7b50b1a3e961b68ac9104f6ad36da39bd36f5630
SHA512062beddb3dc306d1d5a7c08acbf4c5c919f08eeba3570900198d3666482baecec47d70b25cf505baadcc8ecf1280e2476f5a2f73dbb426d21b5c7907549ea5e7
-
Filesize
10KB
MD5c17cca2d038e66b67e7366b3e5b155ca
SHA1ad8b09c61b3950a6ddd7d4ab741b0d75e9bd21e4
SHA256643d4c86f32dcfef353b682e6af2bfbc290fb0121bb6f55ad99ab516aacf5215
SHA5123641062ee828301adccda7067218a79ba29662565b098b65db4fda31004705d35fab7b01e8cb1bfc5cd08c46bf97279b9f3faad66af2c6993e880edecfb40238
-
Filesize
11KB
MD5d9ceabe9ed039da39e41b859c85be98b
SHA1b879dbe18b35f230d17081f01fa0433dbef15928
SHA25690153a80a69c2cd596a012f2117583091f52b04fba7da0d1e542351003cc9ecc
SHA512277cf64a38c991d056843f6b05c64a32bc58cbfd475e33a0cf4a42468bf06ae27be51c9611ada55004d6b706ce4cb05a319bde9296c561b83de44c396e22191e
-
Filesize
11KB
MD546257338916880447d3997f5c27ce8fc
SHA1410c554eb551da8f67220a67c0dfcddb2b065d02
SHA25647adcf3f17de76fab3a5548e1881403c91120607023e75f895629b15b229acd2
SHA5125c824e20656f10ae50f52c669b9692d83b77c28e8f4e832a1a3c038e0e62eb19d8a3f1affea186d2773907fa9c6a04cc3f2f5eab10910500e81c57aecec64374