Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 00:46
Static task
static1
Behavioral task
behavioral1
Sample
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe
Resource
win7-20241010-en
General
-
Target
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe
-
Size
1.8MB
-
MD5
93a1d20e5ddae13db5d503dc52520988
-
SHA1
bf50fe949b30fbf0463f129e0c1be4bb35592050
-
SHA256
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8
-
SHA512
3dc12ba4f005127d5dcd9b15d911ceb380500ee2142fbfbeb5b18db6c27887244eb7067ce41fd91d4cb514edc3e4cfb0b2a15004a8fd3f0928aff448200d5d7d
-
SSDEEP
49152:Q13I2876p8VkXEx1zWQZlG3HGVfJ9PezRy5o82s+WP:Q13It76p8XzzxZMHs9sfs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/5228-524-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
2e3a912ec1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2e3a912ec1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2e3a912ec1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2e3a912ec1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2e3a912ec1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2e3a912ec1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2e3a912ec1.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exeskotes.exef5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exeskotes.exec98fa425d1.exe2c45f05fdb.exe2e3a912ec1.exe9590d100f2.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c98fa425d1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2c45f05fdb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2e3a912ec1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9590d100f2.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 3108 chrome.exe 5240 chrome.exe 2152 chrome.exe 5676 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
2c45f05fdb.exe2e3a912ec1.exeskotes.exeskotes.exef5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exeskotes.exe9590d100f2.exec98fa425d1.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2c45f05fdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2e3a912ec1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2c45f05fdb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9590d100f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c98fa425d1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2e3a912ec1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9590d100f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c98fa425d1.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9590d100f2.exef5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exeskotes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 9590d100f2.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exemixeleven.exemixeleven.exec98fa425d1.exe2c45f05fdb.exed3a27eedb3.exe2e3a912ec1.exe9590d100f2.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 2992 skotes.exe 2724 mixeleven.exe 4208 mixeleven.exe 1604 c98fa425d1.exe 4400 2c45f05fdb.exe 4724 d3a27eedb3.exe 5372 2e3a912ec1.exe 5228 9590d100f2.exe 5800 skotes.exe 2284 service123.exe 5060 skotes.exe 3556 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exec98fa425d1.exe2c45f05fdb.exe2e3a912ec1.exe9590d100f2.exeskotes.exeskotes.exef5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine c98fa425d1.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2c45f05fdb.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2e3a912ec1.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 9590d100f2.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 2284 service123.exe 3556 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
2e3a912ec1.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2e3a912ec1.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2e3a912ec1.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c98fa425d1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007537001\\c98fa425d1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2c45f05fdb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007538001\\2c45f05fdb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d3a27eedb3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007539001\\d3a27eedb3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2e3a912ec1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007540001\\2e3a912ec1.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007539001\d3a27eedb3.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exeskotes.exec98fa425d1.exe2c45f05fdb.exe2e3a912ec1.exe9590d100f2.exeskotes.exeskotes.exepid process 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe 2992 skotes.exe 1604 c98fa425d1.exe 4400 2c45f05fdb.exe 5372 2e3a912ec1.exe 5228 9590d100f2.exe 5800 skotes.exe 5060 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
mixeleven.exedescription pid process target process PID 2724 set thread context of 4208 2724 mixeleven.exe mixeleven.exe -
Drops file in Windows directory 1 IoCs
Processes:
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exedescription ioc process File created C:\Windows\Tasks\skotes.job f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5372 5228 WerFault.exe 9590d100f2.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c98fa425d1.exed3a27eedb3.exetaskkill.exeschtasks.exeservice123.exef5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exetaskkill.exetaskkill.exe2e3a912ec1.exe9590d100f2.exeskotes.exemixeleven.exemixeleven.exe2c45f05fdb.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c98fa425d1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a27eedb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e3a912ec1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9590d100f2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mixeleven.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mixeleven.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2c45f05fdb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exe9590d100f2.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 9590d100f2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 9590d100f2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2972 taskkill.exe 3872 taskkill.exe 1752 taskkill.exe 3468 taskkill.exe 3528 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exeskotes.exec98fa425d1.exe2c45f05fdb.exed3a27eedb3.exe2e3a912ec1.exe9590d100f2.exeskotes.exechrome.exeskotes.exepid process 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe 2992 skotes.exe 2992 skotes.exe 1604 c98fa425d1.exe 1604 c98fa425d1.exe 4400 2c45f05fdb.exe 4400 2c45f05fdb.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 5372 2e3a912ec1.exe 5372 2e3a912ec1.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 5372 2e3a912ec1.exe 5372 2e3a912ec1.exe 5372 2e3a912ec1.exe 5228 9590d100f2.exe 5228 9590d100f2.exe 5800 skotes.exe 5800 skotes.exe 3108 chrome.exe 3108 chrome.exe 5060 skotes.exe 5060 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe2e3a912ec1.exechrome.exedescription pid process Token: SeDebugPrivilege 3872 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 3468 taskkill.exe Token: SeDebugPrivilege 3528 taskkill.exe Token: SeDebugPrivilege 2972 taskkill.exe Token: SeDebugPrivilege 4216 firefox.exe Token: SeDebugPrivilege 4216 firefox.exe Token: SeDebugPrivilege 5372 2e3a912ec1.exe Token: SeShutdownPrivilege 3108 chrome.exe Token: SeCreatePagefilePrivilege 3108 chrome.exe Token: SeDebugPrivilege 4216 firefox.exe Token: SeDebugPrivilege 4216 firefox.exe Token: SeDebugPrivilege 4216 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exed3a27eedb3.exefirefox.exechrome.exepid process 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe 3108 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
d3a27eedb3.exefirefox.exepid process 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4216 firefox.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe 4724 d3a27eedb3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4216 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exeskotes.exemixeleven.exed3a27eedb3.exefirefox.exefirefox.exedescription pid process target process PID 4980 wrote to memory of 2992 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe skotes.exe PID 4980 wrote to memory of 2992 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe skotes.exe PID 4980 wrote to memory of 2992 4980 f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe skotes.exe PID 2992 wrote to memory of 2724 2992 skotes.exe mixeleven.exe PID 2992 wrote to memory of 2724 2992 skotes.exe mixeleven.exe PID 2992 wrote to memory of 2724 2992 skotes.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2724 wrote to memory of 4208 2724 mixeleven.exe mixeleven.exe PID 2992 wrote to memory of 1604 2992 skotes.exe c98fa425d1.exe PID 2992 wrote to memory of 1604 2992 skotes.exe c98fa425d1.exe PID 2992 wrote to memory of 1604 2992 skotes.exe c98fa425d1.exe PID 2992 wrote to memory of 4400 2992 skotes.exe 2c45f05fdb.exe PID 2992 wrote to memory of 4400 2992 skotes.exe 2c45f05fdb.exe PID 2992 wrote to memory of 4400 2992 skotes.exe 2c45f05fdb.exe PID 2992 wrote to memory of 4724 2992 skotes.exe d3a27eedb3.exe PID 2992 wrote to memory of 4724 2992 skotes.exe d3a27eedb3.exe PID 2992 wrote to memory of 4724 2992 skotes.exe d3a27eedb3.exe PID 4724 wrote to memory of 3872 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3872 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3872 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 1752 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 1752 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 1752 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3468 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3468 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3468 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3528 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3528 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 3528 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 2972 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 2972 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 2972 4724 d3a27eedb3.exe taskkill.exe PID 4724 wrote to memory of 5096 4724 d3a27eedb3.exe firefox.exe PID 4724 wrote to memory of 5096 4724 d3a27eedb3.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 5096 wrote to memory of 4216 5096 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe PID 4216 wrote to memory of 3748 4216 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe"C:\Users\Admin\AppData\Local\Temp\f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"C:\Users\Admin\AppData\Local\Temp\1007518001\mixeleven.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007537001\c98fa425d1.exe"C:\Users\Admin\AppData\Local\Temp\1007537001\c98fa425d1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\1007538001\2c45f05fdb.exe"C:\Users\Admin\AppData\Local\Temp\1007538001\2c45f05fdb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Users\Admin\AppData\Local\Temp\1007539001\d3a27eedb3.exe"C:\Users\Admin\AppData\Local\Temp\1007539001\d3a27eedb3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1704 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4d49b773-b3a3-4e69-a451-e2751368c386} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" gpu6⤵PID:3748
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39dbbcca-96f1-4f9b-be24-2bacd3447641} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" socket6⤵PID:3032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3260 -childID 1 -isForBrowser -prefsHandle 3280 -prefMapHandle 3288 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ea45bad5-187e-4265-9a5b-d976b6095500} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" tab6⤵PID:3676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4016 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 3984 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e44f5bf-25d4-4208-afea-ef3bd61341f8} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" tab6⤵PID:3444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4280 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4720 -prefMapHandle 4716 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6ff01b7d-9b99-4ad7-9ea5-23ed069d65fa} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" utility6⤵
- Checks processor information in registry
PID:5220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 3 -isForBrowser -prefsHandle 5556 -prefMapHandle 5552 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c15be6de-7080-48b1-92f1-6a2d7ccee803} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" tab6⤵PID:3872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5684 -childID 4 -isForBrowser -prefsHandle 5692 -prefMapHandle 5696 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {35fe0b98-260e-48c0-8a3b-ea52c82f0510} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" tab6⤵PID:2472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5912 -childID 5 -isForBrowser -prefsHandle 5768 -prefMapHandle 5872 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59817c02-1bb6-40cc-b7c8-5f344b790fbf} 4216 "\\.\pipe\gecko-crash-server-pipe.4216" tab6⤵PID:2648
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007540001\2e3a912ec1.exe"C:\Users\Admin\AppData\Local\Temp\1007540001\2e3a912ec1.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5372
-
-
C:\Users\Admin\AppData\Local\Temp\1007541001\9590d100f2.exe"C:\Users\Admin\AppData\Local\Temp\1007541001\9590d100f2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5228 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb5285cc40,0x7ffb5285cc4c,0x7ffb5285cc585⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2080,i,1791912622479761358,7277980410772376592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2076 /prefetch:25⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1672,i,1791912622479761358,7277980410772376592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2120 /prefetch:35⤵PID:4472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,1791912622479761358,7277980410772376592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2284 /prefetch:85⤵PID:5124
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3160,i,1791912622479761358,7277980410772376592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,1791912622479761358,7277980410772376592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Uses browser remote debugging
PID:5240
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4504,i,1791912622479761358,7277980410772376592,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4560 /prefetch:15⤵
- Uses browser remote debugging
PID:5676
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2392
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5228 -s 18084⤵
- Program crash
PID:5372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5800
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4604
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5228 -ip 52281⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5060
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3556
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize26KB
MD5aa639e83dcb21efd5223511d695b4997
SHA12d8e75e3f2f2667e90778408480eaf5672da7db3
SHA256e9cd01d6921cd6a6fd2f404eaa4d778d92a9955a6ff07371925065e3523d6b41
SHA51271b869898ccf76b99c8406fd3f212bfdf2a7735daa2e91e9cdfd104a75ce96f35c98743a9d01c07e2b5df8be3de2808c5028cbb45d78d56e29d87fe6ce29ab61
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5e4d85f7ca8293bb184ef450cbcacbc63
SHA1cc5fe215466809b6a5630e397a412ea80f86bfe5
SHA25690742f0b90328404ba2d21f4541d97f670b83d978a996495e3e38cbeace4a8f9
SHA512ae462cc0cdcbd7ce1a125bfbae4a261b17b9117cc0ce4c9fdb49fc331933cb141bb9530ccba71cc38817bc391c547d02945a84786b220bd7fa045ed9c2d07f48
-
Filesize
428KB
MD55237853dbebaefb1dfa86130dd1d39fa
SHA1c2a42211c8970e1f10cc13261d5e133739c196f4
SHA256e185e43f039f7a97672db4a44597abd6d2bf49c08d7bc689318a098ec826bb00
SHA51272fc21a0d325b88b4e99d66d05f77ac362aa03cdd41db053cfecd2fec148740bc5349fa45001650500f844ff76784bc12177543deb8d075c5c84e93420c15c7a
-
Filesize
1.8MB
MD5de0479866482075eead948de5ed353ef
SHA1817c54ba06830e3fa579bb53b21d95ce2af37e80
SHA256508dc6038db822c21cce37bc9aac1694637abe532b5edf89942a829074639e0d
SHA5129bd2cf13a30cdc2836fa82ec056db9ca0c9f94ce7e1d0446d0a72e1d3b985c09ba2aeaf5099ad79eb8450c68e76c01aeca03cf6a1715d5cad6eeac7280b7f2f3
-
Filesize
1.7MB
MD5ed06943d9d911219cd6f78939799044b
SHA150aa51c40a252a5ba8a387413c469fb110ca13be
SHA2563f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf
SHA5122f05d1b8328bf6178dffaa6941106496e1dfd53a8ad793ac236d3aa98f5332c5cc4250552a10f566af563e072bb0e7506007f6aac26bf44bbfab963269500ce2
-
Filesize
900KB
MD5b02583abf5640a7b340e3856d1d97b7a
SHA1aaa40e9fea46884fc01d20a2072d915e0ba413cb
SHA2564ade4fbaba2bb171fe05f150f8376c3daa7d7c79e0ecebcaa0a15aaeb1d31632
SHA5126621203ffa697fabe3e986f033e6da5534d233557d709f9529d485636e0cb4254da760cbb72562523526195f4e4ba6042acfce842a0fea338efe14943b02bf4c
-
Filesize
2.6MB
MD5a0b198a5fd53cfff7e90ad121b4c40a7
SHA191ffbf7e61f3fe5b8fea9edc95c0a07eac19d842
SHA25654fba3007a5aa7435b178f3ed61e22f3643c9fdd49cb845290ff15be84dc58b3
SHA512da04642e10465d16a44ba12d4262804bbf4a7ac40591cadcc550c7d6008c6acaeb6a5ef5646bd0dfdbb071ce66929bd1d6cb65be8df2a538740e8ca196e7297c
-
Filesize
4.1MB
MD5eeafcff9019f6db830551b94ded6ec31
SHA10177b0c665ce005f1a82cea394af45fcc798331e
SHA256b51c39f9a5b2176d0e3a06036460db52d19a94cb4827cf523c00a2e567fd586e
SHA512b37a82d84d1573d908cbbb57422bb4965329204f84452083bfdaa346feeca77db147eae51528d292c7ed477c3c97b0a88d48c23cde522208d200db768f6ecf55
-
Filesize
1.8MB
MD593a1d20e5ddae13db5d503dc52520988
SHA1bf50fe949b30fbf0463f129e0c1be4bb35592050
SHA256f5d0a964b108dde3e46f77ee7e3f0b071834fda009959d1559ef96317731f0c8
SHA5123dc12ba4f005127d5dcd9b15d911ceb380500ee2142fbfbeb5b18db6c27887244eb7067ce41fd91d4cb514edc3e4cfb0b2a15004a8fd3f0928aff448200d5d7d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD5a1f2aae037c40fb82a5004846ec3d4e1
SHA16d9ba5ccc0cf2ad127d770c217e028bf4970baab
SHA2566e06931a8c800f7ecc00c424b15523e9086b3639a61daec1fb4d841010dd47e7
SHA512dcf9dbe70d17668c2114c69a8c7c1ebe2d43cc3f39429967e778f3e571e38e3f0a25ef1343717281cbdeffbc544f3522537e905f457026456209394db3397ebd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD5abdd0a043a5e1fcd43a288271b58a3b3
SHA1550514834285b6ff3e7b847c64f4949b6b22b05a
SHA2569c89a16b40f5d3261d14e3799a05d20ead38b29457603db95bf6ffffd26cf26b
SHA51230417576e5a68e73f03e9afd7c68fc494d4f7200d481a43ee33384333beaec67b26408628a351c7ffb2e8dab6e8893faae1a11177832240239d1a17673a9492f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize13KB
MD5bc9c4c3f8bd0efb03fb79a9ea763c7ce
SHA1f2e94be135e65492f7341c60a0b30a0598c507ae
SHA256b059ba0b31db4f97b331c384ede7c676549ab601797531206d862bec1a3373a3
SHA512fc1ceffe4f1c783349cc06ce5a172d82dec01b25961bb6438c65e7888ac48131482e22c21e7f500794b32e7d726a2fa4352a3c9a8e2934152d93093dc2124ba1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD57342dcacbfcf6b7dc7cff0ced513c1c3
SHA10a5b2d1dc44e7881e9f45f681f0ae01aab04e445
SHA25690815dece640ff1012f54d138e77b8928521df26cce8170c1e29e0ef0a66390b
SHA512df20d15029f2afdf5c229018e3ee4c7f92a00b30fab9bcaf35e1386e4eb8f94da5f51431c109214090d13d2697b7e792dd6e09ce41660b390735518c0590ed5d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD534ff8de890f55dcaf0c92d5bb69df127
SHA14ba9c1ecd7322a787a666a3eb933a4b99fcb5952
SHA256f6d5c4d2c4862ef2cd7b5d6d621451cea2fbee01125b47f1d18f11ab74c0fd80
SHA512a357c214c6874640a9f06199aad4915c26b02ed40c73d4aa1c9cc2aac5ef4dd067f06fe929a928b34a49f34a679b280a3e4ec3514f61c7bd253e8123974eed60
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD50dd2f1c443e8bcd44532ac41d6de3c17
SHA11e2bcadab5690d300b2794fb3fee360999d3a42f
SHA2563f951b2addd7c9396a465b4f91b7cd06478c8b76a95ca7d163cbd8286175e93b
SHA512247405a41e92106ed9f42d78237d0175ba325081f12bd5b4d623de629457d41d642bc2c057da70f4a944034d8846dc25511dc0d6c1969efc532832505cdb21a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD587df9ef7eef411a1130c827e02450453
SHA1737c0cfc146f361667476129e410cca22d8544d3
SHA256f3ea95a31f28cd87996160847fe19e2246913d0ee331b505c96c248904fa2711
SHA512a7832d76e546cb0d752f6025822b5121387dc7a5a75b99d6c6673868fbc2f7ada4c83e9351c0de9d53c1cdffab4c8b9fbd5fe6d42a18fef50b487c4198eff95c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5a176e48b10abab6fb1794db7963e3c70
SHA1087bc72cb4159ab53669c37b36367575617311e1
SHA256651584ee5c3298caa760972a57af1ed17d3547af20084a56bbf9858d3dbd6527
SHA512a5a7546c52e5ca9a18760e8c11442def4bd79c6c2ccccee98fc24b98ace1ac9ab58c4519b9e599423d57d300651594ff8b0ba87aadc278e7083823bcb5462a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD541f35cecf5c5a1285f5c1b80f313a632
SHA15a5225e903ee28a56eeca9ba98b2df89f5067d13
SHA2561b49eab0bd347cdf80bba60d099c753d230d6ee6e2df5018b40b702a0bec9629
SHA512d64248d9741ae2162ff1cfe7cdedea01ad17d2292d3dfbdd691d794496f379e6a5ca611ced69a2cd7f7b561ff16381a95a415f48cf84e1f95570b7a3c5639444
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\c4540921-d2b6-4407-b451-edfc99f46fb6
Filesize982B
MD5ba3328925e766b3a44a0ed8cc5f43b83
SHA11481f618aa98d903841679f9ff4554a8f8fe5588
SHA25613afecbd723cc34ba34a753fc81adea7ff15ded6033eac04207cad568cdc98c2
SHA512256baf2019bc32fab9113ff53102c2a51c72fa996c1d387aaff351c98742552e057b1c0255037c94214c4363788371bd4faba54001ae317b7bbc1b3a4c7c66d6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\f8a0fc3e-1a9e-4d6e-a353-a892c0cfb760
Filesize659B
MD5d2c573745a1d026489cf15505f1d3058
SHA1133c48c6842b94d129db6d8513813cdad5c1bc80
SHA256ac3f544dfd669ba6bf2c614238637905bfb7506c95a6c09d4ceb53912bfc63e9
SHA512b745d3be5739d5b823af451f95ab851c1158754538e04949099d028bce575a668a87280c9f9897bd9add975163088a7e0dcd4a1d7ff072de5b9f2698af96fc23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5c7015daed4f7f64fc3075ca238ed0edd
SHA1dd388711d14a5e6827956b106b5b8f750292cf4f
SHA2563a651461c0d1f0d81744c12884254c72243589218bbb37fc8d2b77a872252346
SHA512a80671ef5647f7a4af2e497ea88f92d8342ead0fe537adb5aa318144a40fbce67be94fbea562dca16f5ab0350452ee22f5f81f9686f332225c4a8c6589cbba7f
-
Filesize
12KB
MD5db38b2bdbded7f4a3de77b2b97894e12
SHA16193a310a55a7d31643676a6e44b2c41bff195af
SHA256336e53a3e5d2a8d3fb671b88af2335ce2ba82380ae98421740027e862f17df2b
SHA512638970a8cadbb9620aa8b6fa6e11358ddfe2577d8ac24980d44a62d1e493ea7d1d348f847411002ef4d30be378e0b1134c1a0c3ba8f570754fdf612a659ed078
-
Filesize
15KB
MD547d2ab8b23be957bad6bc738de5f70bb
SHA1084b52da15575a4db56c9e26ee81e61cc0dfe900
SHA256d72ad98c790810793598766196df55c29e9473694711f367d1610de0dd9e1a08
SHA512e47343b349a90cdb73a3fb1848cd4a8e2930a462b728a8bf237cb971255c755ac12e382074c32a61f83a7c86d1c3d9ce8b441c0fcb1b2788e53b04127dcac42f
-
Filesize
10KB
MD5fcb835d8d14978b84354165810ca8056
SHA1c9c6865664237ec600e639481eb7ea562623a349
SHA256194edbe53934eaba43310119454cb2bb1ff900c75ae3750d145ac40f2150ac97
SHA512ea96aa74e831132c3c5d646e69cd3397255faa7925b7998a50ee125a5a58eb7f0e6192759b87bbe3c8567d75c6b1c01b334581f626f36544a60a92625110491f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.6MB
MD5f5884f9ab810a6e0d7c7760c7bb4852f
SHA159d67ad2b108323ac410b7a7584a267fafeaf487
SHA256539706d8077686c93fa74e397f73283be299ca252ec17b9c846c7c3ee17c389a
SHA51229f4d310c7d816921638b454cc1760adbbce5ed8368582ac6260d8a163574202b29ac6cae8cdb0a54c323779b00d9b86092d362598cf3a53a7309c8afdff9a2f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e