Analysis
-
max time kernel
149s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 09:51
Static task
static1
Behavioral task
behavioral1
Sample
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe
Resource
win7-20240903-en
General
-
Target
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe
-
Size
1.8MB
-
MD5
37243d85edc9216a9e33f76de6e12f77
-
SHA1
a9c3eb83766b32b495614b039e01bb2a5f4c27e7
-
SHA256
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6
-
SHA512
1a8de2cd05a608ea84518d0c8732b3cfbac3aa37a131133b43d03ce2911b337f2fa438de15139f957c4f5dde44032f1550434788c200a7f9d81a877ee7feeda9
-
SSDEEP
49152:bqO/snbqA2RlOGmdmnMoIdd4NJccVXZPXaRQIetRa:Dsnp2OAWd0JccnPXs/e
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://processhol.sbs/api
https://p10tgrace.sbs/api
https://peepburry828.sbs/api
https://3xp3cts1aim.sbs/api
https://p3ar11fter.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3988-135-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
Processes:
8c39258000.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8c39258000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8c39258000.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8c39258000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8c39258000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8c39258000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8c39258000.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
89f7f0eed3.execc78eb0624.exeskotes.exe8c39258000.exe1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exeskotes.exe5bd144e706.exeskotes.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 89f7f0eed3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cc78eb0624.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c39258000.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5bd144e706.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5740 chrome.exe 3936 chrome.exe 644 chrome.exe 5372 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe5bd144e706.exe89f7f0eed3.exe8c39258000.exeskotes.exe1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.execc78eb0624.exeskotes.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5bd144e706.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 89f7f0eed3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c39258000.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5bd144e706.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cc78eb0624.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 89f7f0eed3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cc78eb0624.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c39258000.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5bd144e706.exe1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exeskotes.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 5bd144e706.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exe5bd144e706.exe89f7f0eed3.execc78eb0624.exe861d7d0442.exeskotes.exe8c39258000.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 2432 skotes.exe 3988 5bd144e706.exe 908 89f7f0eed3.exe 264 cc78eb0624.exe 1788 861d7d0442.exe 4372 skotes.exe 4400 8c39258000.exe 3716 service123.exe 5484 skotes.exe 4892 service123.exe 636 skotes.exe 32 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.execc78eb0624.exe8c39258000.exeskotes.exeskotes.exe1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe5bd144e706.exe89f7f0eed3.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine cc78eb0624.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 8c39258000.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 5bd144e706.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 89f7f0eed3.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid Process 3716 service123.exe 4892 service123.exe 32 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
8c39258000.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8c39258000.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8c39258000.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\861d7d0442.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007379001\\861d7d0442.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c39258000.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007380001\\8c39258000.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\89f7f0eed3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007377001\\89f7f0eed3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cc78eb0624.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007378001\\cc78eb0624.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023c7f-85.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exeskotes.exe5bd144e706.exe89f7f0eed3.execc78eb0624.exeskotes.exe8c39258000.exeskotes.exeskotes.exepid Process 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 2432 skotes.exe 3988 5bd144e706.exe 908 89f7f0eed3.exe 264 cc78eb0624.exe 4372 skotes.exe 4400 8c39258000.exe 5484 skotes.exe 636 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5440 3988 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exeskotes.exe89f7f0eed3.execc78eb0624.exetaskkill.exeservice123.exetaskkill.exeschtasks.exe5bd144e706.exe861d7d0442.exetaskkill.exetaskkill.exetaskkill.exe8c39258000.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89f7f0eed3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc78eb0624.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bd144e706.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 861d7d0442.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c39258000.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
5bd144e706.exefirefox.exefirefox.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5bd144e706.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5bd144e706.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3008 taskkill.exe 420 taskkill.exe 1544 taskkill.exe 4780 taskkill.exe 3852 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exeskotes.exe5bd144e706.exe89f7f0eed3.execc78eb0624.exe861d7d0442.exeskotes.exe8c39258000.exechrome.exeskotes.exeskotes.exepid Process 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 2432 skotes.exe 2432 skotes.exe 3988 5bd144e706.exe 3988 5bd144e706.exe 908 89f7f0eed3.exe 908 89f7f0eed3.exe 264 cc78eb0624.exe 264 cc78eb0624.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 4372 skotes.exe 4372 skotes.exe 4400 8c39258000.exe 4400 8c39258000.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 4400 8c39258000.exe 4400 8c39258000.exe 4400 8c39258000.exe 5740 chrome.exe 5740 chrome.exe 5484 skotes.exe 5484 skotes.exe 636 skotes.exe 636 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe8c39258000.exechrome.exedescription pid Process Token: SeDebugPrivilege 420 taskkill.exe Token: SeDebugPrivilege 1544 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 3852 taskkill.exe Token: SeDebugPrivilege 3008 taskkill.exe Token: SeDebugPrivilege 3184 firefox.exe Token: SeDebugPrivilege 3184 firefox.exe Token: SeDebugPrivilege 4400 8c39258000.exe Token: SeShutdownPrivilege 5740 chrome.exe Token: SeCreatePagefilePrivilege 5740 chrome.exe Token: SeShutdownPrivilege 5740 chrome.exe Token: SeCreatePagefilePrivilege 5740 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe861d7d0442.exefirefox.exechrome.exepid Process 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 1788 861d7d0442.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 1788 861d7d0442.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe 5740 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
861d7d0442.exefirefox.exepid Process 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 1788 861d7d0442.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 1788 861d7d0442.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 3184 firefox.exe 1788 861d7d0442.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3184 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exeskotes.exe861d7d0442.exefirefox.exefirefox.exedescription pid Process procid_target PID 1364 wrote to memory of 2432 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 86 PID 1364 wrote to memory of 2432 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 86 PID 1364 wrote to memory of 2432 1364 1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe 86 PID 2432 wrote to memory of 3988 2432 skotes.exe 94 PID 2432 wrote to memory of 3988 2432 skotes.exe 94 PID 2432 wrote to memory of 3988 2432 skotes.exe 94 PID 2432 wrote to memory of 908 2432 skotes.exe 99 PID 2432 wrote to memory of 908 2432 skotes.exe 99 PID 2432 wrote to memory of 908 2432 skotes.exe 99 PID 2432 wrote to memory of 264 2432 skotes.exe 101 PID 2432 wrote to memory of 264 2432 skotes.exe 101 PID 2432 wrote to memory of 264 2432 skotes.exe 101 PID 2432 wrote to memory of 1788 2432 skotes.exe 102 PID 2432 wrote to memory of 1788 2432 skotes.exe 102 PID 2432 wrote to memory of 1788 2432 skotes.exe 102 PID 1788 wrote to memory of 420 1788 861d7d0442.exe 103 PID 1788 wrote to memory of 420 1788 861d7d0442.exe 103 PID 1788 wrote to memory of 420 1788 861d7d0442.exe 103 PID 1788 wrote to memory of 1544 1788 861d7d0442.exe 105 PID 1788 wrote to memory of 1544 1788 861d7d0442.exe 105 PID 1788 wrote to memory of 1544 1788 861d7d0442.exe 105 PID 1788 wrote to memory of 4780 1788 861d7d0442.exe 107 PID 1788 wrote to memory of 4780 1788 861d7d0442.exe 107 PID 1788 wrote to memory of 4780 1788 861d7d0442.exe 107 PID 1788 wrote to memory of 3852 1788 861d7d0442.exe 109 PID 1788 wrote to memory of 3852 1788 861d7d0442.exe 109 PID 1788 wrote to memory of 3852 1788 861d7d0442.exe 109 PID 1788 wrote to memory of 3008 1788 861d7d0442.exe 112 PID 1788 wrote to memory of 3008 1788 861d7d0442.exe 112 PID 1788 wrote to memory of 3008 1788 861d7d0442.exe 112 PID 2432 wrote to memory of 4400 2432 skotes.exe 114 PID 2432 wrote to memory of 4400 2432 skotes.exe 114 PID 2432 wrote to memory of 4400 2432 skotes.exe 114 PID 1788 wrote to memory of 644 1788 861d7d0442.exe 115 PID 1788 wrote to memory of 644 1788 861d7d0442.exe 115 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 644 wrote to memory of 3184 644 firefox.exe 116 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 PID 3184 wrote to memory of 4884 3184 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe"C:\Users\Admin\AppData\Local\Temp\1015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\1007372001\5bd144e706.exe"C:\Users\Admin\AppData\Local\Temp\1007372001\5bd144e706.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5740 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa8222cc40,0x7ffa8222cc4c,0x7ffa8222cc585⤵PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1248,i,4353527989177307168,6662663662171241112,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1596 /prefetch:25⤵PID:6092
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1892,i,4353527989177307168,6662663662171241112,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2312 /prefetch:35⤵PID:6112
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2168,i,4353527989177307168,6662663662171241112,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2620 /prefetch:85⤵PID:6140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3148,i,4353527989177307168,6662663662171241112,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3160 /prefetch:15⤵
- Uses browser remote debugging
PID:3936
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,4353527989177307168,6662663662171241112,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3332 /prefetch:15⤵
- Uses browser remote debugging
PID:644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,4353527989177307168,6662663662171241112,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4392 /prefetch:15⤵
- Uses browser remote debugging
PID:5372
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3716
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2632
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3988 -s 12844⤵
- Program crash
PID:5440
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007377001\89f7f0eed3.exe"C:\Users\Admin\AppData\Local\Temp\1007377001\89f7f0eed3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\1007378001\cc78eb0624.exe"C:\Users\Admin\AppData\Local\Temp\1007378001\cc78eb0624.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:264
-
-
C:\Users\Admin\AppData\Local\Temp\1007379001\861d7d0442.exe"C:\Users\Admin\AppData\Local\Temp\1007379001\861d7d0442.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1892 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {40baeab2-3f7e-4009-a853-d5fcb44be15c} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" gpu6⤵PID:4884
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2436 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e2e8e54b-317c-4701-bb8d-564d5d066542} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" socket6⤵PID:3996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 3084 -prefMapHandle 3052 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0181e293-623c-4298-84d9-7fa2512afdc7} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" tab6⤵PID:4880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4072 -childID 2 -isForBrowser -prefsHandle 4064 -prefMapHandle 4060 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a80e751-2b75-4b67-91da-013939ade650} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" tab6⤵PID:408
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4944 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4348 -prefMapHandle 4908 -prefsLen 29197 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c983f53d-5a54-46f9-88fa-a43ec6ed23b8} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" utility6⤵
- Checks processor information in registry
PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5292 -childID 3 -isForBrowser -prefsHandle 5288 -prefMapHandle 5256 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {97eb5fd8-9c3c-4db0-ab90-22b3b396dbfa} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" tab6⤵PID:3256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5512 -childID 4 -isForBrowser -prefsHandle 5432 -prefMapHandle 5436 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7fd3b35-7a92-41d4-857b-9fbcc935a268} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" tab6⤵PID:420
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 5 -isForBrowser -prefsHandle 5640 -prefMapHandle 5644 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1084 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5ec87413-aa8d-4ece-af8c-a56a330338b5} 3184 "\\.\pipe\gecko-crash-server-pipe.3184" tab6⤵PID:2300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007380001\8c39258000.exe"C:\Users\Admin\AppData\Local\Temp\1007380001\8c39258000.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4372
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3988 -ip 39881⤵PID:5188
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5484
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4892
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:636
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:32
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize21KB
MD580186581378e3e92a903391ef1b55e7c
SHA1e96a8e5c17b85b871a11fa3c9f61dd2edbb59fec
SHA256edef66e1664281c442f86dd254b3e98a51dfd712fdf4f636aa5eed0dffca4682
SHA512892250d4a7e3fc182c6745fea9f99486110374081a934d83afbaceeebc941ea57444c52bd39279131c21c0e5968e219ef1464ea8714e95fd536052abac71852f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5a5e252310e1117c0549d36255ca8f0dd
SHA160351410dbdf4898d46a5bc8c07a79ded9d60642
SHA256242a7ae09ec243d99eb70b28bc9f203d8338bbc1e10fdca3ea54296ed6c3a462
SHA5128a879881631b2da0d545ee4af00742dbd8f054109510aeb393b65967020373582b4b57e5caac2295f0ef64e143a196103e1a57a797f9ed18366ca58a5574bd9e
-
Filesize
4.2MB
MD58a650e31804b47bd65f97f71897ecee4
SHA143698b9e15d9d2a198bbefca8d29c989a7af3b45
SHA2562a6e81a997ee42091e15bad50f499dac926a76f2b5ce407455e3e8c5ce741e2f
SHA5122fc486b852e177ce56232890f9697d43cacce4b3047083f256b202f014f153179d932ab2a00175234c8be7c6b875632f4800e916e8a3222582ce5d19a204aacb
-
Filesize
1.8MB
MD59710969012bd1ae57c9f4492603ccc6b
SHA1edd3c8fc284eb6176a6fc1180e8057c72deff075
SHA256d4eace78034e2fa56e08b2f0027bbb3b40a8503375e91adca3b4306d8cd71281
SHA512712ae17e3b6e436e7cdfec7b93967149e49ce1654622477072e672d7a57789d237c32b8e5072c2c06d9f890f0913808bd89670f020f888d51c8d56b9644e53e5
-
Filesize
1.7MB
MD5ad2614f8fc64b80170d83371df79985c
SHA1a1cd004ba4f69b78b293fdeff44f5704482eb648
SHA2563259290c189d3a3d59ee28223294cc53e2447d81e1a01e1a5e0139be27541657
SHA512354b41d4ac30b6725659d17ea2e63ed50eb565aa2a5a6df98042ab1aabd6293469554e5af7b8995a78ab01506f832fb76a2e931daf2949be7e5c2ae15dfa9724
-
Filesize
901KB
MD5f13cc916b97f8732d38ff9323a50e414
SHA163fdfd5245ca3ed2bfefbf049316c1bc46663bbb
SHA2566c8450c17d5bdaa89221c94ad83256199045772f85bfcbe1e9c0d545a7a440ce
SHA512d6761cd6c34f39b1e40b7dd685b1095baf3cb8cd0696406e1580e90e47464002c6af43217e827d5c74d8a9bb6c2b154057287f8291ec1055a088868f03df06a6
-
Filesize
2.7MB
MD52391bf7c8409b5125fb9143f75a7d052
SHA17729b100845ec6ff313d70d261f51acd31e1427f
SHA25653cbf6e8136b46bccacc78871cb92efb13c6eaaf555b71493fd749aedab63a1f
SHA512c21ee402731beb7f15a7a9b7ee6177a57048f830995689796c372eeaacb8d5b7b88479cbb96d13867f73c19836c34a17c84a631da23fce181d45eac094604697
-
Filesize
1.8MB
MD537243d85edc9216a9e33f76de6e12f77
SHA1a9c3eb83766b32b495614b039e01bb2a5f4c27e7
SHA2561015eaa4d58916d0c27ea54bc055f6a6e9587a546f1e7a3c0b28b75f39825fe6
SHA5121a8de2cd05a608ea84518d0c8732b3cfbac3aa37a131133b43d03ce2911b337f2fa438de15139f957c4f5dde44032f1550434788c200a7f9d81a877ee7feeda9
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD533e6c890d614ea9cfb20fdcdd070f471
SHA13b092b4681ab42a99839dcef7e3d05edf909edef
SHA256995787cc84fa1ce5ca5cf5314406f1d34fe42a6db98c8a4a9e441fa96a5201f4
SHA5125eedfd3d5215a531a30c11a4072776b6c7ccf913a663368a21abcc67fa9788d1ceec8749feca97c44a8433af5366d9b8dc1266e696a9d6b3befc7516206d8b88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD5b361959621f3ec7b1fb1d7c77635ef53
SHA1a9f13fc025cd4964fec65bfc0adef40aac90f21c
SHA2561cb73953f3e92603a48064e407514f620376a37ed41e7ba2051d6a728d2856cc
SHA5124eb7e57cae63a10cdb77f91129345ccbfbd94fbe2c23c0755908d9b61dcf14980b2d4231f091eab874c6cc5808eef0de4a9ef1a999cac71b343fd7eabec1f11b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ded4a656c7912272839b63ba34119ac7
SHA106f7453cb9da03de74d5852d75f501441bd498b2
SHA256a9144d84c72d906f04b7ad52df07afc4fffdc7297bc886da96dae1bf6edf3239
SHA512b017a912f28528909088a41b2f858d32a4926288280d862cf0ef6eba469ddd96c4adfb2e9abd56f97bf44f248bfb961419104dcd747f7f66c29ef719e7903368
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e1932a15a34d862e387d441bf7a63546
SHA179dc470aa112eb1a42955f2464cef226e80ab680
SHA256ab877d0a7f7ca052ea2eb694f23b4a323362df6b1e5f7c61cd82e39678d075f5
SHA512c11fca63263d4489a7987743bc37408cce8f25a518d043a8ec2d2cbda30d8f1ca177650d89387e6a66ce38329e4ca03b3579e5f4bdd9cc9b858ed6ee8dff79fa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD59c4bd9ccaeb55996492c9d739b06abf4
SHA130b434d66ab38c4ac5aa7dfab303538ea29a7656
SHA2564b868e34a399a4805bd58fb3c798336c92bdfc21c60516dba0e17907d31f4756
SHA512d618e0406281348a3934c21cc811b420449f1346294718385bee6b8bbba814adb2a341901fd5f21e020793cf183ed9ca5cc0c60a2a256c4b087196695d854f26
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\250bd64b-10cd-4429-be39-4dd04cb57544
Filesize671B
MD5ae1d20fac8d80c5d3f393f8ad0795631
SHA19b1e48f94b183f3c88c4dbdba2828197021c0b34
SHA25684934c0fbac56e4a01450eeaf7c5b2fe2758b9a4f43100f2aed8401133dbb052
SHA5120afaf90a93ac60003445e0c242d8ce8f38593b10a29d92ececc61a8070e07d8a6405d18637a03936e1326257763637a7528928594f79210f1640242031016a0a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\363aafa0-cc2a-4732-8b1c-199d02cdb638
Filesize26KB
MD52b8543a57687b974a64d801d1e211d1c
SHA1b572624869676dd89d8cb279fa070801b1fed26b
SHA2562831226e9ebfe29a5a92a5a25438175bf7dc1d80fe2c070df10369e4639b0324
SHA5120dba587dacadcbf647722e61536ee759410605ea55f0c98b47f7996b090d7a4e9283afd55dfd8078861fd994f81d9672a89b4751170e9d1875f5a89d80296b94
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\a6292b0f-b0d0-4b0d-b7a6-0066d58d1c4a
Filesize982B
MD52cc2d6f81ad3537be9c0f11afc16c200
SHA14d52308ce6d80fdfe40d05bc5fe9b6abb035dbb8
SHA25670c70713be22bf99d2ea3043dc5a424bde23fa9e8585c745070dcb3779fe1d8e
SHA5127e2e79073d3dabf4432631f88b46b41dc270668ddbfc3a5af1133e470ea85612ddeb12eb1d16bc8ca61a8db2309a50e8ba3f156abcee09d5660e98a3abeb094a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD508accd1c2b1c4bd6e564fb281ff131ee
SHA1e7fb5d144679537fb7fe73439e9887c90d16c8ae
SHA25660e56e401caa6abf99151eccc109087470dff618ae594e8444a34e7a234cb4c5
SHA5120f4aa53c4306fb2ceffb686ba3ca673acb2992414977f843333e6bed2378b765154918177ad9555a816795f8c4bff1ffac5b04780168dd3853848b668eeaa0dc
-
Filesize
16KB
MD59e81337291e1ca6403b08af0c8c4dd42
SHA10af21412857133990eb4be4f376ba5dc31cded1b
SHA256095ad38182c621ba13908b12a4c4b2ca53782c90be88f4607f30e43c5bf96f98
SHA5125fa4003f5a9c15cd1919f43328f7b389d3b7f4734c01a51aa2708e2893caa9330e1254c13f07ffa33045732357b4a96c5a7a287263ce59a1c64d014028ae23c6
-
Filesize
11KB
MD55e1224eee6f57946a5fc46fb5e72b8d8
SHA1cfc45549cb3ed175586fd7ee58c4bfe3e9ccc193
SHA2561b262e227d158c4a3ef6ad43faba7ec1b0fa87e0dd36a614297cdc3fbbbb64e2
SHA5128b5e22b43f2b9a451c92732bec56a5bf8029ae3dd7dc5c730dc1188089abc28ecba09b31baad372c45548cb3ec887c11721e80b49e9596cc9ca7cc0c859dc0e5
-
Filesize
10KB
MD5274c46b0ce854c18b8459aef608b3558
SHA10c1f45786c7281e3404e4353e003ed2e7804dd27
SHA2565613662701fa99edf56df8720191dcc7af918bf2736611ffab4fa4de54b85f4b
SHA512340131294ed2cdd4db96513f7c210a8b1b154c98ebfbd3038182f3e9bcd8544e6bba7742066d936220abebb6417579aada3c80253336732acf8c3e7a340b8b42
-
Filesize
16KB
MD594a3a58b4ac30e365ca5a689ebda0cb3
SHA1b64c51a308a29be348eff309a0863a2e4de08504
SHA25637bb017471473b31f6c847f71e9bf64eb41ef069405c3ef5a48fe1455d328dd7
SHA512559a7692051f02c0346aca307bcb9e4b0eebe46f929fa31a3b950aceede999f6651363e9adc9f3d316f0ec884229ce2dd79e41b7415d3e0d02369948ac1db178
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize936KB
MD5d13beb98bc42637169ac60ecc70e51f8
SHA10ed61a8644f02087e89e84c218007670935f52b4
SHA256c507327910f6990bff2916e45bed286334dd922df092879f7e3c47a433a8ffb0
SHA512888896dfde9449d8b12ed699f2ba65549f6ea11097ac5029d5ba02a675411b613bfa2aba3ae97f35bc9ef21c5b39b5b1cdcb7442408463b2a25423fc599e7894
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD51cb97db81689e78a01cff980a3cd12d9
SHA154f7072b61ee7b4429f401155c967c02edc60f62
SHA25693d9b45eb6d61603def91afee7c20e81d228617d3ab6b5213282cb0b2b5b0000
SHA512d470861f832a85c52fbd006873d579923aa7a3eeda9639d8fec0de4041c0613ec1f2f88934eb838ee57c5fe07915071e89c0f34dee8ba4541656c6a9fbb4c068
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e