Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 21:06
Static task
static1
General
-
Target
61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe
-
Size
5.2MB
-
MD5
12ff469efc267268e7e3ba6073ffe4b4
-
SHA1
93ca628a235ffac9182020af8e6ed63f4ced3c6d
-
SHA256
61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554
-
SHA512
2a1fccdce2657a910365e53ec62f4cc413d78dfebfed2f9156d97e0d968b14c2a6343a6eace7d96a409ab4416cf9eca353082d2eeb2c559b5bd39f8ac2180d29
-
SSDEEP
98304:fkxnbzdTT4UFsKtfQFNks6f/aN2DhZsDPFDEbdv33MX92O0:AbzdTTzf2ksbEV3yM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/5980-3756-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
Processes:
f380f3d9b3.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f380f3d9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f380f3d9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f380f3d9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f380f3d9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f380f3d9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f380f3d9b3.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
Processes:
1J19w9.exe3R09i.exe96a5ac1fc6.exef380f3d9b3.exeskotes.exeskotes.exeskotes.exe2v3688.exe31e3bb5db8.exee84500824c.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1J19w9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3R09i.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 96a5ac1fc6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f380f3d9b3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2v3688.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 31e3bb5db8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e84500824c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5948 chrome.exe 3016 chrome.exe 4168 chrome.exe 4216 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exe2v3688.exe3R09i.exe31e3bb5db8.exef380f3d9b3.exeskotes.exe96a5ac1fc6.exee84500824c.exeskotes.exe1J19w9.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2v3688.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2v3688.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3R09i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 31e3bb5db8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 31e3bb5db8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f380f3d9b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 96a5ac1fc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3R09i.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 96a5ac1fc6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f380f3d9b3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e84500824c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1J19w9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1J19w9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e84500824c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1J19w9.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1J19w9.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 13 IoCs
Processes:
C0v33.exe1J19w9.exeskotes.exeskotes.exe2v3688.exe3R09i.exe31e3bb5db8.exe96a5ac1fc6.exe45e7c52353.exef380f3d9b3.exee84500824c.exeskotes.exeskotes.exepid Process 3000 C0v33.exe 1748 1J19w9.exe 3648 skotes.exe 112 skotes.exe 4860 2v3688.exe 3316 3R09i.exe 2856 31e3bb5db8.exe 1560 96a5ac1fc6.exe 2480 45e7c52353.exe 4832 f380f3d9b3.exe 5980 e84500824c.exe 5840 skotes.exe 5420 skotes.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
2v3688.exe31e3bb5db8.exe96a5ac1fc6.exeskotes.exeskotes.exe1J19w9.exeskotes.exeskotes.exe3R09i.exef380f3d9b3.exee84500824c.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2v3688.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 31e3bb5db8.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 96a5ac1fc6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1J19w9.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3R09i.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine f380f3d9b3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine e84500824c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
f380f3d9b3.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f380f3d9b3.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f380f3d9b3.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
skotes.exe61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exeC0v33.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45e7c52353.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007244001\\45e7c52353.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f380f3d9b3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007245001\\f380f3d9b3.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" C0v33.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\31e3bb5db8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007242001\\31e3bb5db8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\96a5ac1fc6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007243001\\96a5ac1fc6.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0007000000023cac-88.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
Processes:
1J19w9.exeskotes.exeskotes.exe2v3688.exe3R09i.exe31e3bb5db8.exe96a5ac1fc6.exef380f3d9b3.exee84500824c.exeskotes.exeskotes.exepid Process 1748 1J19w9.exe 3648 skotes.exe 112 skotes.exe 4860 2v3688.exe 3316 3R09i.exe 2856 31e3bb5db8.exe 1560 96a5ac1fc6.exe 4832 f380f3d9b3.exe 5980 e84500824c.exe 5840 skotes.exe 5420 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1J19w9.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1J19w9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
31e3bb5db8.exe96a5ac1fc6.exetaskkill.exe3R09i.exe45e7c52353.exetaskkill.exetaskkill.exetaskkill.exee84500824c.exeskotes.exe61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exeC0v33.exe1J19w9.exe2v3688.exetaskkill.exef380f3d9b3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 31e3bb5db8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96a5ac1fc6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3R09i.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45e7c52353.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e84500824c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C0v33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1J19w9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2v3688.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f380f3d9b3.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exee84500824c.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e84500824c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e84500824c.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 4832 taskkill.exe 1864 taskkill.exe 4804 taskkill.exe 3888 taskkill.exe 1528 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
1J19w9.exeskotes.exeskotes.exe2v3688.exe3R09i.exe31e3bb5db8.exe96a5ac1fc6.exe45e7c52353.exef380f3d9b3.exee84500824c.exeskotes.exeskotes.exechrome.exepid Process 1748 1J19w9.exe 1748 1J19w9.exe 3648 skotes.exe 3648 skotes.exe 112 skotes.exe 112 skotes.exe 4860 2v3688.exe 4860 2v3688.exe 3316 3R09i.exe 3316 3R09i.exe 2856 31e3bb5db8.exe 2856 31e3bb5db8.exe 1560 96a5ac1fc6.exe 1560 96a5ac1fc6.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 4832 f380f3d9b3.exe 4832 f380f3d9b3.exe 4832 f380f3d9b3.exe 4832 f380f3d9b3.exe 4832 f380f3d9b3.exe 5980 e84500824c.exe 5980 e84500824c.exe 5840 skotes.exe 5840 skotes.exe 5420 skotes.exe 5420 skotes.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exef380f3d9b3.exechrome.exedescription pid Process Token: SeDebugPrivilege 1864 taskkill.exe Token: SeDebugPrivilege 4804 taskkill.exe Token: SeDebugPrivilege 3888 taskkill.exe Token: SeDebugPrivilege 1528 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 2144 firefox.exe Token: SeDebugPrivilege 2144 firefox.exe Token: SeDebugPrivilege 4832 f380f3d9b3.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeShutdownPrivilege 4216 chrome.exe Token: SeCreatePagefilePrivilege 4216 chrome.exe Token: SeDebugPrivilege 2144 firefox.exe Token: SeDebugPrivilege 2144 firefox.exe Token: SeDebugPrivilege 2144 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
1J19w9.exe45e7c52353.exefirefox.exechrome.exepid Process 1748 1J19w9.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2480 45e7c52353.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe 4216 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
45e7c52353.exefirefox.exepid Process 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2480 45e7c52353.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2144 firefox.exe 2480 45e7c52353.exe 2480 45e7c52353.exe 2480 45e7c52353.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 2144 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exeC0v33.exe1J19w9.exeskotes.exe45e7c52353.exefirefox.exefirefox.exedescription pid Process procid_target PID 4672 wrote to memory of 3000 4672 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe 83 PID 4672 wrote to memory of 3000 4672 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe 83 PID 4672 wrote to memory of 3000 4672 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe 83 PID 3000 wrote to memory of 1748 3000 C0v33.exe 85 PID 3000 wrote to memory of 1748 3000 C0v33.exe 85 PID 3000 wrote to memory of 1748 3000 C0v33.exe 85 PID 1748 wrote to memory of 3648 1748 1J19w9.exe 88 PID 1748 wrote to memory of 3648 1748 1J19w9.exe 88 PID 1748 wrote to memory of 3648 1748 1J19w9.exe 88 PID 3000 wrote to memory of 4860 3000 C0v33.exe 90 PID 3000 wrote to memory of 4860 3000 C0v33.exe 90 PID 3000 wrote to memory of 4860 3000 C0v33.exe 90 PID 4672 wrote to memory of 3316 4672 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe 96 PID 4672 wrote to memory of 3316 4672 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe 96 PID 4672 wrote to memory of 3316 4672 61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe 96 PID 3648 wrote to memory of 2856 3648 skotes.exe 98 PID 3648 wrote to memory of 2856 3648 skotes.exe 98 PID 3648 wrote to memory of 2856 3648 skotes.exe 98 PID 3648 wrote to memory of 1560 3648 skotes.exe 101 PID 3648 wrote to memory of 1560 3648 skotes.exe 101 PID 3648 wrote to memory of 1560 3648 skotes.exe 101 PID 3648 wrote to memory of 2480 3648 skotes.exe 102 PID 3648 wrote to memory of 2480 3648 skotes.exe 102 PID 3648 wrote to memory of 2480 3648 skotes.exe 102 PID 2480 wrote to memory of 1864 2480 45e7c52353.exe 103 PID 2480 wrote to memory of 1864 2480 45e7c52353.exe 103 PID 2480 wrote to memory of 1864 2480 45e7c52353.exe 103 PID 2480 wrote to memory of 4804 2480 45e7c52353.exe 105 PID 2480 wrote to memory of 4804 2480 45e7c52353.exe 105 PID 2480 wrote to memory of 4804 2480 45e7c52353.exe 105 PID 2480 wrote to memory of 3888 2480 45e7c52353.exe 107 PID 2480 wrote to memory of 3888 2480 45e7c52353.exe 107 PID 2480 wrote to memory of 3888 2480 45e7c52353.exe 107 PID 2480 wrote to memory of 1528 2480 45e7c52353.exe 109 PID 2480 wrote to memory of 1528 2480 45e7c52353.exe 109 PID 2480 wrote to memory of 1528 2480 45e7c52353.exe 109 PID 2480 wrote to memory of 4832 2480 45e7c52353.exe 111 PID 2480 wrote to memory of 4832 2480 45e7c52353.exe 111 PID 2480 wrote to memory of 4832 2480 45e7c52353.exe 111 PID 2480 wrote to memory of 4044 2480 45e7c52353.exe 113 PID 2480 wrote to memory of 4044 2480 45e7c52353.exe 113 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 4044 wrote to memory of 2144 4044 firefox.exe 114 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 PID 2144 wrote to memory of 1948 2144 firefox.exe 115 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe"C:\Users\Admin\AppData\Local\Temp\61ee5d73894b8e36a28e68f353b47de3eced147cf4a8242a06154a9821943554.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C0v33.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\C0v33.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19w9.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1J19w9.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\1007242001\31e3bb5db8.exe"C:\Users\Admin\AppData\Local\Temp\1007242001\31e3bb5db8.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\1007243001\96a5ac1fc6.exe"C:\Users\Admin\AppData\Local\Temp\1007243001\96a5ac1fc6.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\1007244001\45e7c52353.exe"C:\Users\Admin\AppData\Local\Temp\1007244001\45e7c52353.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T6⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking6⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking7⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2060 -parentBuildID 20240401114208 -prefsHandle 1972 -prefMapHandle 1964 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc08c8a7-33ca-49df-8abe-1d47afa94417} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" gpu8⤵PID:1948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2492 -parentBuildID 20240401114208 -prefsHandle 2484 -prefMapHandle 2480 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d66c6bde-6720-4861-b562-a1c63deea4b6} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" socket8⤵PID:4560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2832 -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 2828 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {659443b4-81f8-4ff8-928a-dcec265e10fe} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab8⤵PID:2772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4136 -childID 2 -isForBrowser -prefsHandle 4128 -prefMapHandle 4124 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {02d4fb7d-4519-4c96-a63e-bc0a38893954} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab8⤵PID:1436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3828 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 1632 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cf9cd0e0-87fa-4dea-9dad-9792f1af7719} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" utility8⤵
- Checks processor information in registry
PID:6868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5244 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5380 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3a0e6199-4a2b-43a1-905b-325020b8c902} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab8⤵PID:5156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5356 -childID 4 -isForBrowser -prefsHandle 5316 -prefMapHandle 5368 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5127ce10-fb61-4167-b998-fe775cfd9068} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab8⤵PID:5160
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 5 -isForBrowser -prefsHandle 5508 -prefMapHandle 5244 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1180 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {915a3e45-6b24-4d1c-919d-13586600e4d5} 2144 "\\.\pipe\gecko-crash-server-pipe.2144" tab8⤵PID:5216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007245001\f380f3d9b3.exe"C:\Users\Admin\AppData\Local\Temp\1007245001\f380f3d9b3.exe"5⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Users\Admin\AppData\Local\Temp\1007246001\e84500824c.exe"C:\Users\Admin\AppData\Local\Temp\1007246001\e84500824c.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5980 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"6⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:4216 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7fffe94acc40,0x7fffe94acc4c,0x7fffe94acc587⤵PID:2332
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1896,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1892 /prefetch:27⤵PID:5176
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2000,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2124 /prefetch:37⤵PID:5200
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2588 /prefetch:87⤵PID:5388
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:17⤵
- Uses browser remote debugging
PID:3016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3436,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3456 /prefetch:17⤵
- Uses browser remote debugging
PID:5948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4224,i,14567888252449252890,7148358251499919033,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:17⤵
- Uses browser remote debugging
PID:4168
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v3688.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2v3688.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3R09i.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3R09i.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:112
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5420
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3128
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD52c3966cfaf97693bf11449336d528559
SHA1fae30d968d5b19cc156b5f619834054ca04c3693
SHA256788b708244404bdaa3817e17cd607c46d786ea7700ff948656533e9c5e516a30
SHA5129cc67822653404333ae40439bd55e28125cc314916e81d4ba030575856afdb845597d3d4deff69d0663f48706d87e411890dcf97b55a8c7bdbbacb366eb8a371
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD570dda7733339d88d4002a092a12ecb01
SHA135087ab336aa89be2a6f562131155d1fd28eae15
SHA256c37d5aab1a15eb21f4beef9d5dd1b30b866cf9c2c5686c9671eaa24761937953
SHA512ad6c98400bb60de25c5a2b4635be027af327b5c099268d9d5db22ca3b2abc0878cf33992bf9d8fd4d3afb88d11e530c55d9cfb0e05d88750683cb8b80ca01f92
-
Filesize
1.8MB
MD5657a0831f669a0085d4e79295b57af68
SHA1228ae245de0113a5c98d1d4a434164048206306a
SHA256b9560e99138b10aa3243880a71aa5229a1d9f9fa31eb8bfcda99781859a90bb8
SHA51207abec32d45f9017698d7a018e9746b292ba6bb8b0b9571ddbb66ee850158ad68f4b0ba9a42be4c2b71c294590eb79d622e751bf9592a27e4e57dfbd747e5b50
-
Filesize
1.7MB
MD576827fde25839a637186f7fe5ae9a16f
SHA1bab71273f9cd4ac843a7d7a461ffb0ec9e9682c9
SHA2564a72a777521ea5b75d7c3e32331ceb2ab870a25b2a64168fb3cfb16eb767c951
SHA5126744dceaa0b02d2eb512a71df81b5df59e49b9148d9f934244b975446f7f63f0a99073348766485a8c17042fe58ddb0eabfff5326853900e9f90b43757b50ee3
-
Filesize
901KB
MD5f2a69e8a8e25a98910c9485b68b9e39d
SHA1fc980404bc20c5eb91ea0d9b8281d6d294d55b0a
SHA2568cfc88d84ea2463b5942e2e30357260fbdb677d80d4c94f2d52f447ccb573e0a
SHA512857a4231f1a5ccfefa69bd52948eb5669f8419676b25c794c24488377cc19406487aba45a4d4b7a1576eca835c760f55f2f9cd146068bd1d710d2d326ad844e3
-
Filesize
2.6MB
MD5aac30885d28c52f21da49e1ca8f0b68a
SHA1f116169079ceae5459adacd7b8f5425600df93fd
SHA256543281397bb30296334be6d97c0daadc2567827affd71ff1d811124b8b464cf9
SHA5122c46de5f993f323aa83066d2eff34591113194cb1847c377a6ede030de74e897eb03dfadbfeef2ee66df990afffea4e83c8d225ba0fdb9275b7d3bb83d2775d3
-
Filesize
4.2MB
MD5f1b25767284aa3dbb2ee4b14cf43af3f
SHA144880c3fc6dcace137118790a40d1a1a449d8fbc
SHA256738978c433edb4c822b92cd4c9c07c760174f5ac6826c90dd1a80c26e5f431b6
SHA512f4973caa1c10835a483ddf41fb9b6367d2ca74ea90de9156f340ec54f72529726e55bcefc51552542698d320a85cf515c8a6ee7774a186752ab07f1736803a4b
-
Filesize
1.7MB
MD5e3fb8d95bf3280bcaec77ae6d1b6f357
SHA1d8cb310e8bf2d8af8b3265d4f17b6163617f389a
SHA2568913aa554d50871ce1c5086aec81ad11cc16f90a815b3151b2234782d8c5a63e
SHA51282b7f2bcfdb064096d0cf0b8a7a798c3ae89a4558afa8caaafe0d95f80390bc097d97455a53a9be3cae28385a42beb85e79e020d13f85a54b33fe25a3bc2e49d
-
Filesize
3.4MB
MD59cf2b7e99352a52a6dadf75fcb40eda8
SHA164a6841e6801c75bf38377bd419436d22fd1b1d6
SHA25604135d1c9dc5e589b27dc3b909b32c7e004114b7955a3a2c9f85591de21e5eb6
SHA512e6d75d4ddbf39ed90f06b400d257dfc05e866accbafce5361f26bde2fa7edb106aa54707b2b8959f4fcb38160d00ce38808a561820230e9d1b44b8d9d6e04d13
-
Filesize
3.1MB
MD539df199149a48e97910026f0e71c3c0c
SHA145ac46911f5d850d67c642e2a0ba6d6675d21af3
SHA2565b7e4d0b0ce95d0df04db3372e1ce4e5812766b58ed68aff2052d689c5911087
SHA5127ae33353a33e9e71af35958580fcceeeb3cb5ec78768bffe8f0d848f5328ebdfb9114fe632dd54a44420e7770559376d68d4533930573e2adb20768cb92504cc
-
Filesize
3.0MB
MD5339c52d2c7eec1633781ec61ccc7514e
SHA16b09c06d7a22426b2328bffc613048f10ac4e8ab
SHA2562b85e0eea5090d9465aada5fc32e429809d84501beac1b4d006ac172dfd46a33
SHA51267006226777747bbd7fd7d6849a53464f55c37f19944b9afdd67971b8f061a56744eb1a3fe2884e866b0ba081fcae61c81b872265c2cccd6889bb19c1174fc02
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD58f7bbbd875e4c20eb0ea86d7d7c68e3a
SHA108094867713e7f61a5a2cca40d3d2c870b2f5bff
SHA2567ff0b0c61dcc04a81ac2b7f4b16400e47ad0e51ee9ebb038042d608a1614d8d1
SHA5120d74a752acfc93644d9d78903bfbf5f994252cb73d921cbbcf23888299f676f4afa3aa301655f0219aeaa521e3dad47924a41ebe11e63a5a2578752105012c8e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD5f4bed8fbb8eda42426e6890ebc2bc051
SHA1a6e27479c5ca2994ab8e104a61074cf7de095fa8
SHA256899043ba60e05edfa6b3a9a80e8e9947d48bff9270c52708596631750d4daf16
SHA51289095a472d8e9d0c98bcdeeda21588384ef079eea40bf8c5c02b6b8394df33c4b602fbd23116ec9d13b6383ec45fd8502a1b02dbd5328f0ea0aeb4bada67e507
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize5KB
MD53ab38b7e554a07914b57dbeefa258bab
SHA19ab94f89101d0dc0d0a1e2e2bf594abd20d39d16
SHA2561ecee53fa19807167b2a4377c199f4b840d979cd394d3951beae013fd3e4649e
SHA5123c10fbd57eaeacb1a1fa4ce6d1745477833b7f58147a5be0937b3217a8974d39233a80d2ef863a6fb2ec0985156f3960dab73290b0ed934648f975ffb7bd2909
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD541672780c91a8b0ecea1fc4b34327e05
SHA1b952fdcac9775bef237fb04dacc8f5691471ba80
SHA256592f7c945e0c1465ed650b688c12d3338d5b7480d2a0be3d954f2abffbe4af3c
SHA512affdac0976829307730afcc19962b3043cafb031f16b383a2052d24165187b56397d0c986d17ee68b1785ea72da1ca58175f12338ca20223eb306af86bee6ff5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD545cdf754fb36ba9f9ce1e74344c5fa66
SHA181d4874eca36c072aa2cd05a91fa9b2c2b797eb9
SHA256244acd8353e8499631e78178752c7529e1dc7f068347b95c01b3d6295295331c
SHA5120d4ce325c7806b2e8cac7fbd721a58f3586383ee7730963058e1512c39021ffde6014a727de16d4fd1fe1fa0c45d678b2971ed5090eb133c379fa3102247b7a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ff2e7cf81472d5f083f8af0f2a6f255a
SHA14db33810dac7d5f33544419f0d09f15e4f39f192
SHA256256697d389bb9ffa73e08914807a2205235eaa246dd912dcfdfef94d711dc850
SHA512eba2c7f65cb9ad54e4bab37b03cde91880e1fb321deb41fd3fa3feb3e0c3605f892164d2c779f5caf3da7b1e282cc1b86abeabf68fe684c0aac8500d49a80434
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ff80359a410921c66309895f6615395b
SHA19998353ce96a7a8d6dbdcc2e76f69aa3d047e79c
SHA256caabc220d04accbc8b2ae8ea552377e740c426fdcb8579c1560cc27222fdb2c7
SHA512b5fbb11539a13f88eb6975ce349eca9f8acaf99cf50d043e59c95099840348a7dffe0d95a0f6677a248e478a169e3586043a56df98a841c498d34e6f06b1cdc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59c50148406557fcdc256251b777e7ed0
SHA102ca58ebfb2f8d7353837480fb547c8241a779c2
SHA256b34918a331eb79ce42b0c777bf1af56c132fb1c29d4e5cbc74ebeed8a563ea74
SHA512647c3051bc7b6ad1c774c7782dce366107ebdf25228e11e966bc514668a6904ce78bb8e56efce92a32d263c8fd2a7da52488ece61724115c8bb04459f7536a01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ae359eebcaf0ce82b246c41593f1442d
SHA15bf8973791b165a7b29db45f2291a93da1ea7938
SHA256bc0b6c9157a1eb6852a3cb381a96736db627f2ea5435c5307107e720dc93c3aa
SHA5124c8e0ad2caa8985b7c003177c36f82133185a7f15409a7e2b42caa1182247b0266457b925280703e0dbe0206fe18bd7566f01aabd0ac86aab8c7eec2c19a0aa1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\bbba19b1-3299-4fc2-be7d-3eff2a2b47b1
Filesize671B
MD5a500471611a8fd4467d35eb88c3c4f78
SHA13f9aa28b61d45f3a7b1163a2ac5c7dde03464b46
SHA256f15d6fb0e78e40b6f5f980d944cbc9ceec0439e9c5c312a037919b9261098246
SHA512f39c34b1f8eb257519370642caa60de353705a559026541ff5616888292a05782e33c400670b735aa65aea3aa071f06d2ed166bb7eaf40218ce0f4d5c9b6a358
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\c942af3d-b6a8-4d03-a779-c1271dc2e1ff
Filesize982B
MD5fd10ce888f659df3fc4f0909206c0595
SHA1dd9b9fc9b9f77b7c2315ce7f49000432815c9898
SHA256bbf212f6e5270621239d11942387fa955c447910e3dccf9beb9166c131cef120
SHA5127e07802896fb7a084ff8b1079613b0b700bd1444a8c8bb1a9422e99a4946ffd9f51c2260c31c050a4893733d10ac9feaaba6a8935cc561e282287b37ac97e1b0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\dcd21d99-ac1a-4c9b-98cb-6d5ab63bdda9
Filesize26KB
MD579e564b405e81a45c25739747b87db23
SHA1945a2fcb308845458cd5ff238916d13ee69524c3
SHA2563f755b66364c9ee55e3d8dc7df47743c61c2b718a45179d11c667af91eb25a15
SHA512677c56293422a47f65ab510192186476a1801bf7a60921740f2bcce5aee4ae2520478622e8845b20d455a4521f6d3bfcece8299cc7466088108d5484d3d85939
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5c8816fa663bfbdb8e38418b155a6d1ca
SHA128ce3e34134049479585b6730bc14465c51d8ba4
SHA2565511af1c5fea4a978896423ac35f8af5d9a16f94213ece28f46b8945c5867371
SHA5127f7c2198304246b46e48915f5f62e0e50924b052b8ba267613cb0bb68947808e9643551d7d85bc2409669d67c5257a2970b2867273cd70b5ff21bc6d87dd6311
-
Filesize
16KB
MD526e6c850a70e697d6615a055c4bf65a4
SHA1c8c6ea92f7f2e29d28694e5048247c497a656465
SHA256c640bc976a35bc9a89825329df4ed9b61ed3745f768c0fb3171dc802ba44d7ce
SHA512c585d088daebb4577897da1855f4b56aadbc6c77bf8e0466d13493006823d0df9a8039ecfda93beec69ef1358f348a08994dbd58c43ad4b798002eec6d6bd4e5
-
Filesize
11KB
MD5925dbf0f8a2b07f8cfaa4bffadc26a6d
SHA11b295b6f7784b0c581a7be76694cacab7004504b
SHA256175dda38f41fdaceb6ac9a0a33dd971723b5d6a3cef152607d0836c7ba28010d
SHA51259306925577de3fb1c9ca33e427d72e552306fd62f33cac2c10cedbbc47e0d2b5a7b07e3c93290ca713dc7ed840e04ffd87d4dc45d70027b2fbf63e99654ecdd
-
Filesize
11KB
MD57aef56729b3cb1b51a3d9d42e0dd069a
SHA1c5924bf851a0cb121229f67a178ac7883c5642e4
SHA256ae217e52d53104fa7725e3c884144d44bee34f2ddc886c7bb0de4e75377562b2
SHA5120f61ca229c9ccb0c6a77728e34fbd4640a732d5d34bd8416c76289dee5594081ed0bc2231c34e598df1865c8c9094fb448bb969b939232e9de140b1540b2d687
-
Filesize
12KB
MD5cc51310972fa35ef73d3683a832601bc
SHA1fdeb042631a0fd3f9c08490e1b973e652344c251
SHA256ba356682bafb4346f99375adab1c825c3a48b8142295a0ef630dac63a90ae137
SHA512b4e240284936ba978c6ee8a1ebf3d12db10d9975c9dc13ee5acfd4c09f9944bce3415ec71c238e9475736aa8c36e1500572a571c5f3b44bdf5d7ee827854aebb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e