Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 23:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
59f5af250b791f322c85fe9c08dfe363
-
SHA1
2093ad91f24fdfdb63d2e084a9bec3387f260f92
-
SHA256
c35563580053a62c9a624d4174580f9799662690daf31938e1ce75f10d04c8de
-
SHA512
df907a4635c21b653bc0344a66fd3343972bb93b72e141a767dd20e8cdd6109afbd52604fe535294e2ad28feba55de30d73528ef0659ed8b81412aaf542d2361
-
SSDEEP
24576:PGecQ6u+G/E7zv16uXK9Kh2iWhRFVi05GsvwbqYFoZ/AroLbqlpHtAJJ9qIGUbnJ:PdcH9G/En/Kph3ViSvwbqYGZHLbGsn
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4320-138-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
6142af1583.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 6142af1583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6142af1583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6142af1583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6142af1583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6142af1583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6142af1583.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exeskotes.exe99d4f88ed9.exe7e4a3641a2.exede0729da49.exe6142af1583.exefile.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 99d4f88ed9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7e4a3641a2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ de0729da49.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6142af1583.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 800 chrome.exe 884 chrome.exe 5376 chrome.exe 5648 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
de0729da49.exeskotes.exeskotes.exe99d4f88ed9.exeskotes.exeskotes.exefile.exe7e4a3641a2.exe6142af1583.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion de0729da49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 99d4f88ed9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7e4a3641a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7e4a3641a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6142af1583.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 99d4f88ed9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion de0729da49.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6142af1583.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exe99d4f88ed9.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 99d4f88ed9.exe -
Executes dropped EXE 14 IoCs
Processes:
skotes.exemixeleven.exemixeleven.exe99d4f88ed9.exeskotes.exe7e4a3641a2.exede0729da49.exe7a46f982c4.exe6142af1583.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4228 skotes.exe 3728 mixeleven.exe 4936 mixeleven.exe 4320 99d4f88ed9.exe 2888 skotes.exe 3636 7e4a3641a2.exe 2624 de0729da49.exe 4016 7a46f982c4.exe 3056 6142af1583.exe 3576 service123.exe 5564 skotes.exe 5268 service123.exe 4428 skotes.exe 6044 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
7e4a3641a2.exede0729da49.exe6142af1583.exeskotes.exeskotes.exefile.exeskotes.exe99d4f88ed9.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 7e4a3641a2.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine de0729da49.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 6142af1583.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 99d4f88ed9.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 3576 service123.exe 5268 service123.exe 6044 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
6142af1583.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 6142af1583.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6142af1583.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6142af1583.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007523001\\6142af1583.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7e4a3641a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007520001\\7e4a3641a2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\de0729da49.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007521001\\de0729da49.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7a46f982c4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007522001\\7a46f982c4.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007522001\7a46f982c4.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
file.exeskotes.exe99d4f88ed9.exeskotes.exe7e4a3641a2.exede0729da49.exe6142af1583.exeskotes.exeskotes.exepid process 2360 file.exe 4228 skotes.exe 4320 99d4f88ed9.exe 2888 skotes.exe 3636 7e4a3641a2.exe 2624 de0729da49.exe 3056 6142af1583.exe 5564 skotes.exe 4428 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mixeleven.exedescription pid process target process PID 3728 set thread context of 4936 3728 mixeleven.exe mixeleven.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5292 4320 WerFault.exe 99d4f88ed9.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exeschtasks.exefile.exemixeleven.exemixeleven.exe7a46f982c4.exetaskkill.exeservice123.exeskotes.exetaskkill.exe6142af1583.exede0729da49.exe7e4a3641a2.exetaskkill.exe99d4f88ed9.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mixeleven.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mixeleven.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a46f982c4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6142af1583.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language de0729da49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7e4a3641a2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99d4f88ed9.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exe99d4f88ed9.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 99d4f88ed9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 99d4f88ed9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 224 taskkill.exe 2020 taskkill.exe 2468 taskkill.exe 4992 taskkill.exe 1956 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
file.exeskotes.exe99d4f88ed9.exeskotes.exe7e4a3641a2.exede0729da49.exe7a46f982c4.exe6142af1583.exechrome.exeskotes.exeskotes.exepid process 2360 file.exe 2360 file.exe 4228 skotes.exe 4228 skotes.exe 4320 99d4f88ed9.exe 4320 99d4f88ed9.exe 2888 skotes.exe 2888 skotes.exe 3636 7e4a3641a2.exe 3636 7e4a3641a2.exe 2624 de0729da49.exe 2624 de0729da49.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 3056 6142af1583.exe 3056 6142af1583.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 3056 6142af1583.exe 3056 6142af1583.exe 3056 6142af1583.exe 5648 chrome.exe 5648 chrome.exe 5564 skotes.exe 5564 skotes.exe 4428 skotes.exe 4428 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe6142af1583.exechrome.exedescription pid process Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 1956 taskkill.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 2020 taskkill.exe Token: SeDebugPrivilege 2468 taskkill.exe Token: SeDebugPrivilege 1444 firefox.exe Token: SeDebugPrivilege 1444 firefox.exe Token: SeDebugPrivilege 3056 6142af1583.exe Token: SeShutdownPrivilege 5648 chrome.exe Token: SeCreatePagefilePrivilege 5648 chrome.exe Token: SeShutdownPrivilege 5648 chrome.exe Token: SeCreatePagefilePrivilege 5648 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
file.exe7a46f982c4.exefirefox.exechrome.exepid process 2360 file.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe 5648 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
7a46f982c4.exefirefox.exepid process 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 1444 firefox.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe 4016 7a46f982c4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 1444 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exemixeleven.exe7a46f982c4.exefirefox.exefirefox.exedescription pid process target process PID 2360 wrote to memory of 4228 2360 file.exe skotes.exe PID 2360 wrote to memory of 4228 2360 file.exe skotes.exe PID 2360 wrote to memory of 4228 2360 file.exe skotes.exe PID 4228 wrote to memory of 3728 4228 skotes.exe mixeleven.exe PID 4228 wrote to memory of 3728 4228 skotes.exe mixeleven.exe PID 4228 wrote to memory of 3728 4228 skotes.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 3728 wrote to memory of 4936 3728 mixeleven.exe mixeleven.exe PID 4228 wrote to memory of 4320 4228 skotes.exe 99d4f88ed9.exe PID 4228 wrote to memory of 4320 4228 skotes.exe 99d4f88ed9.exe PID 4228 wrote to memory of 4320 4228 skotes.exe 99d4f88ed9.exe PID 4228 wrote to memory of 3636 4228 skotes.exe 7e4a3641a2.exe PID 4228 wrote to memory of 3636 4228 skotes.exe 7e4a3641a2.exe PID 4228 wrote to memory of 3636 4228 skotes.exe 7e4a3641a2.exe PID 4228 wrote to memory of 2624 4228 skotes.exe de0729da49.exe PID 4228 wrote to memory of 2624 4228 skotes.exe de0729da49.exe PID 4228 wrote to memory of 2624 4228 skotes.exe de0729da49.exe PID 4228 wrote to memory of 4016 4228 skotes.exe 7a46f982c4.exe PID 4228 wrote to memory of 4016 4228 skotes.exe 7a46f982c4.exe PID 4228 wrote to memory of 4016 4228 skotes.exe 7a46f982c4.exe PID 4016 wrote to memory of 4992 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 4992 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 4992 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 1956 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 1956 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 1956 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 224 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 224 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 224 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 2020 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 2020 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 2020 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 2468 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 2468 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 2468 4016 7a46f982c4.exe taskkill.exe PID 4016 wrote to memory of 4204 4016 7a46f982c4.exe firefox.exe PID 4016 wrote to memory of 4204 4016 7a46f982c4.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 4204 wrote to memory of 1444 4204 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe PID 1444 wrote to memory of 3272 1444 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4936
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007519001\99d4f88ed9.exe"C:\Users\Admin\AppData\Local\Temp\1007519001\99d4f88ed9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4320 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5648 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8df02cc40,0x7ff8df02cc4c,0x7ff8df02cc585⤵PID:5184
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2040,i,4008855520033158131,2941354667039225721,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2036 /prefetch:25⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1904,i,4008855520033158131,2941354667039225721,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2000 /prefetch:35⤵PID:6064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2272,i,4008855520033158131,2941354667039225721,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:85⤵PID:6128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3176,i,4008855520033158131,2941354667039225721,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3192 /prefetch:15⤵
- Uses browser remote debugging
PID:884
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,4008855520033158131,2941354667039225721,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3240 /prefetch:15⤵
- Uses browser remote debugging
PID:800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3632,i,4008855520033158131,2941354667039225721,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4528 /prefetch:15⤵
- Uses browser remote debugging
PID:5376
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3576
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5684
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4320 -s 13044⤵
- Program crash
PID:5292
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007520001\7e4a3641a2.exe"C:\Users\Admin\AppData\Local\Temp\1007520001\7e4a3641a2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\1007521001\de0729da49.exe"C:\Users\Admin\AppData\Local\Temp\1007521001\de0729da49.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\1007522001\7a46f982c4.exe"C:\Users\Admin\AppData\Local\Temp\1007522001\7a46f982c4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5442b91d-10bf-4e02-893a-673a78418163} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" gpu6⤵PID:3272
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d749fd3d-07cb-4cda-92a3-2901938884cf} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" socket6⤵PID:3792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3136 -childID 1 -isForBrowser -prefsHandle 2880 -prefMapHandle 1576 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51712102-01a9-4e91-a0f8-87cbf560066b} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" tab6⤵PID:1972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -childID 2 -isForBrowser -prefsHandle 4084 -prefMapHandle 4092 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7647e0f4-2062-43ce-9a94-17084ecd9f7c} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" tab6⤵PID:2888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4824 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4816 -prefMapHandle 4808 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {064411ca-aae7-41db-a844-89ad902e14da} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" utility6⤵
- Checks processor information in registry
PID:5240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5164 -prefMapHandle 5148 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbb0762c-3b30-49ed-a923-6a9da94a5d1f} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" tab6⤵PID:3492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5192 -childID 4 -isForBrowser -prefsHandle 5184 -prefMapHandle 5176 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {eab1bef2-0104-4462-9cd9-a8d5272bc0ea} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" tab6⤵PID:2544
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5432 -childID 5 -isForBrowser -prefsHandle 5440 -prefMapHandle 5444 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fc942df1-e42f-4b96-9919-996ba0b3141d} 1444 "\\.\pipe\gecko-crash-server-pipe.1444" tab6⤵PID:2460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007523001\6142af1583.exe"C:\Users\Admin\AppData\Local\Temp\1007523001\6142af1583.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2888
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5152
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4320 -ip 43201⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5564
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5268
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6044
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD5485f117df6ba7f85bbcad705bf1360c5
SHA1d2ab13c84230d71ab87b423249790b3575a6cdec
SHA256b1b9db4a2b0fca477cce4fedfdc167d90c38aacd5d2ebf76da6b199caa04f7df
SHA51259f3b63b71241c23544b29a0da36f6114188124fb3fc56309a9751aea6ed3adc968ae4a6abf1ce50cc11376e3b53069c807d17ec668be4ca9eacbf2525013e91
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5e21815547e15a204de4d07ecaef59215
SHA1943d7696d271c25286a3a90937504b013b258419
SHA256e6c726574e6e2d1a9011bfe0253068713c7d0d0c453eca4ced69b92f454f48c2
SHA5121635db43277540b23d3ffee7a9ac6ac8d9d455ba20fd216074c1114c79bbc79faf8cdc33220fbd209468c9738114bb78f1d74342fbdd58762b3dda026213533b
-
Filesize
428KB
MD55237853dbebaefb1dfa86130dd1d39fa
SHA1c2a42211c8970e1f10cc13261d5e133739c196f4
SHA256e185e43f039f7a97672db4a44597abd6d2bf49c08d7bc689318a098ec826bb00
SHA51272fc21a0d325b88b4e99d66d05f77ac362aa03cdd41db053cfecd2fec148740bc5349fa45001650500f844ff76784bc12177543deb8d075c5c84e93420c15c7a
-
Filesize
4.2MB
MD5abf203dd0126ad56347d05e2c0f48322
SHA1b6efee54668e99435319d65f634459eb561c1491
SHA256987b2a963feaca33452ac5dda999e1447f2732014c71c3bc3f5ced7d3227886a
SHA5129c0f42d430a1df1b6b87cb3414dc0ac72524958b4cb4c080bac083ffef4948c011d26c20291ae2e5e46b1dbd20eb325e8657c067fffc9094ff5c0adf12a4e4e1
-
Filesize
1.8MB
MD52d9021d2b87b22f8db44ca359f9838af
SHA14e3376cfa016c0091e2e396255705ac2f401db1c
SHA256b11878f626f1edf687231b583380efdba57ee846801ff869f9910aacfcd7b995
SHA5121a2a9e3e73c52223f2b02f197fe485a48236eee378843050fcb6e05eac5e2eb46ba5947df63f06ac57d0e4e670ade9dbc28ccbb20e1ab1aa51c5fda436c352b2
-
Filesize
1.7MB
MD53264ae26929ff0c3abe85b43070dfd27
SHA1a245f83195576f855bbddac90f9f39da8615ffd3
SHA256cc67fc2b2998c5aa3c0a786908cfb6815a9a0015f0a80c73cbc39f261afa851c
SHA5128ad368c0a8d589d496dfdc430237520198745bd60ebfd52b2a1aea4942c44470ff0e2a63569d427a0b8fb8c59ff6d481db2050ad0ce9d41e0abe61ebff58c6c8
-
Filesize
901KB
MD51afc6ca33051ebf697daf4ea02562fd6
SHA164cfe0ddc48842798859756cd0d8bb1d3dac4738
SHA25691b487952951ee6cd25ff253c5ffd8f270290e6425b247d364115f41f5f362a9
SHA51279068d1de93847c90ccae9c5bf13b529770cfa81116a2fd067e94a6aa00a18a194647014997c2ff10c12be083f9955233622d2192e3740e019ab8516319f90e6
-
Filesize
2.7MB
MD5b3517ef5cd9dc889a546b165b51d823e
SHA186adda45e916e60ab18dc494064449f427801132
SHA256e8b01bcbbcd754dfd9f6ec262fa5a47567764141f1684731b02209e56850a39b
SHA512d7e92de744e5eca583692961dd6466370a9dbc4cb4e9611b5048d1d4a25bebeef06e87b00543edf5fc1d210ed654eb549c16a38dd3c8d00c358dae968b0767b9
-
Filesize
1.8MB
MD559f5af250b791f322c85fe9c08dfe363
SHA12093ad91f24fdfdb63d2e084a9bec3387f260f92
SHA256c35563580053a62c9a624d4174580f9799662690daf31938e1ce75f10d04c8de
SHA512df907a4635c21b653bc0344a66fd3343972bb93b72e141a767dd20e8cdd6109afbd52604fe535294e2ad28feba55de30d73528ef0659ed8b81412aaf542d2361
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD5b1508dbf6b348a979f52d31b11823472
SHA10c56c90ddfdac6306a3f43b4bb4657c851e8e904
SHA256dfac4bf58920b36a981817df93e02a08ca2fff1a761709d2077cd91ba1028e7c
SHA51217457524bd8b98994d5006003fc0e1a93e90053d9d95aac1e94b0d5ed5d15c396ea6eaa6d078caa375c1ba32b7018dd613baf8cd15abba1309e89bf7a2b30e89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize8KB
MD552d478e513810b528033c170de27becd
SHA170a62e6172cd39bbd529eb93b2e24869776fcc03
SHA2569fa3a6f5f52994a1beaad731d23c63cc23aca8e7e53f0ae8f53f67a5d7e2f07e
SHA51268e893c359f53869dbd937f4d56c42354768dcd58b3fd93c5f7864cd43711665d8524b2b41f17bfa1eeb1072f569170aa36d190ea97629619a3de6d87d948920
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD59b60e4f66bb30a02f3c32a700e370ec1
SHA1204c106e745c0020ed1b60e276ae9cdb49402dad
SHA25658ea2ec67298be5aabc3a60a90cbd951399c29d140e4c51cd6104718498f8d3b
SHA51215cd1df0436b77007867d8fddb345f70781aeb84a8436d653b4ee5fa8882cc6e2ea8742394a1fa0c790184089fb42ea7efbba6282644cdd5c3e19c87c673b6cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD567e7785e5f159e93790b52e969818883
SHA10a11230db881c3a4e6b0129881b335fb3cfc0af1
SHA25652399bafa9917da1fce13b0409d477c48e8bbc38d474dc796c4825107b6a6efe
SHA5124b61a490b33e9175195e686a8916aa2f0e88de5a52b96ad010e61fd1410956686979108441192b1e5d415eaf4840b2ff0c489b30a2645869e55451b2a789e3d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5868be74b9ac7be7e4492071a9e35f3e4
SHA18b96d434dc5c4d0ae8be85f92cda8aeb504fa653
SHA25625285b9ddb8dd0c0ee4fe2e20e1f33b2a9c83acea501842b9918df6cbfb328cc
SHA512eec8e0e89c62734329ba69623b990a20a6a9876775530d7fcab90af9a1b1dad50aecf2e3afb6642ba3e1b9dbce8e5d8a59641c11e8ec6ccaa7dfb708700e77dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c96816e542dfcd96f4830ec56579d353
SHA1dcb32fcbefca6773c296b881bca4497861e2541a
SHA2567c9288d7745f0417fb6a674d598dfa1a118448f570bbb91875f4dc2173542afc
SHA5127666cffc2759667aed03111cbc427ad8b82f5bb45ef641cb528861c817cccb51bcb8ec1bb87a56dcf7ee66f30be83a6177191ffd9b162191ee999e611806a522
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\63dce6af-c756-4742-98ab-3c6b79082dd9
Filesize982B
MD5ef1b0864fce4003b0fc6e80a6d3c56a0
SHA165cfacef9a4aa0c92338824d312972e564a4ba04
SHA25654dbdaeb0349604a1fa17f04dd4cf72c5877f17779b870126e64675978c6d8cb
SHA512b8a87a4deda99fac44e2f4e665c9b15f93f2b8694fe3a91fd7d39123d99d37d7f94f158a87f7c91941567bd3c019254b1147672454ef11a5e93997fb37929dbf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\cb86e3a3-c425-487e-a8c0-506080c66f4d
Filesize671B
MD55a1adbe9333ca00f5a75bde88be17546
SHA11652a6be7683f967e3e19a011ebf4bd8cb6c829e
SHA25630b4254042460f29860ff0399b8b7c5e59d8f08fb072514ae1271a300dca19e5
SHA51224de879725c0fc6f50c2661a21b37a0cdd7df190ddcc7c827f951e3d1bd258f6088cfe98aeacdcea8e6eaeeb3070fecbd2384e2152500418104cd6ddd8dc7b3e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\d2b1f887-5627-4720-a4cc-6debc2f9902e
Filesize25KB
MD53870f64a28b316210dc63dbfc595d9e4
SHA1eeac71ec0cf8ef3a30327b64dce4a4c8627495ea
SHA2561a2eb71c12a63b84b2b72da9ee9b0ade7a9fbd2039d25902ba2df09dbc525124
SHA51226afd2124fa2b3794d518b0210bae4f523334cb3be5b7b6c11f78d2b37a6943f089fe4fc80b2aa6e47a4de7aaad296b9b02f6234500666bfc21dee561eee1152
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD590b66973429a5d07e80b145bca46667c
SHA1cf367f06951c8c8b56eafb8bee06b9433f7372fe
SHA25633b4cc6f50ce6d29549aec9cb31a07b633e72bca44dd74f2c6689bba42ce1a2a
SHA5122d14f379d471414b6f803eff64b8bb05afb73dd189a0ee9a7d6e890b74392397e3b17cb2c02e36c435e3e991716b9bf27ca02002e807b6404b16397cb07b051e
-
Filesize
10KB
MD55a5655496d313b059d0e30061437c2f4
SHA17d446927cf6ba6cc5522c8f9d7a2776d71e9509f
SHA2569e3808abcc190336f849f151e48ec678dba72d614b165ed87bdaf06df681c1c6
SHA5124c9bf162209d50fe8cb758cdc6be9f726d9cc6ce2e51740f8a89982de6a6f055210f6aa766d64629311de3c6697481057f3cba4a7cd02d618e53a4c40ee25953
-
Filesize
10KB
MD559b56fc4cff957b14d33bcb7cf5f97bc
SHA10a9f54a0269ad08596941036d1153e8cd1ffdb5a
SHA25621a2cb74399e7e57ccbf26a90d888fced08fd9f37805f11132d8a77016f2a8bc
SHA512add620576fc42eb3c4400c2e4270714af5f09a08eb8883023cf4082c4fde8cf84871a068ddfdee9a508b46cb3c3c5f22de35c67935cbcfb55e7e96d713a3fb6b
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e