Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 01:01
Static task
static1
Behavioral task
behavioral1
Sample
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe
Resource
win7-20240903-en
General
-
Target
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe
-
Size
1.8MB
-
MD5
22ee1495ad3fd1a2a7f4e210e6932916
-
SHA1
a3879ccd26a8b8cbfaa6492f1b75ddd9472b3783
-
SHA256
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77
-
SHA512
d6493a668032c3b31c517545fbef0c3418ad220aaf0b4621d02e0a9a96101efcbf966ea034d258af09c38d2a0c00c2921e7e293480a4a42e7ee1753a7a4eb663
-
SSDEEP
49152:E0HJzySs2Zyi7++BmfPkMjDqh5Nqd7oGjMRPNFtqoX:vH4SJyiq+0jGhSGPNFtZX
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4748-60-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
7ff87bbfc0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7ff87bbfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7ff87bbfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7ff87bbfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7ff87bbfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7ff87bbfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7ff87bbfc0.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
d6ba7acdc5.exe9cd98210bf.exee77aa1fdf1.exe7ff87bbfc0.exeskotes.exeskotes.exe5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d6ba7acdc5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9cd98210bf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e77aa1fdf1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7ff87bbfc0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 6224 chrome.exe 388 chrome.exe 3572 chrome.exe 2960 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exe9cd98210bf.exee77aa1fdf1.exeskotes.exeskotes.exe7ff87bbfc0.exed6ba7acdc5.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9cd98210bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e77aa1fdf1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9cd98210bf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7ff87bbfc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d6ba7acdc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e77aa1fdf1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7ff87bbfc0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d6ba7acdc5.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exed6ba7acdc5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation d6ba7acdc5.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exed6ba7acdc5.exe9cd98210bf.exee77aa1fdf1.exe7b303e34cb.exe7ff87bbfc0.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 2372 skotes.exe 4748 d6ba7acdc5.exe 4652 9cd98210bf.exe 2008 e77aa1fdf1.exe 3348 7b303e34cb.exe 4348 7ff87bbfc0.exe 6988 service123.exe 3916 skotes.exe 6164 service123.exe 6816 skotes.exe 1096 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exed6ba7acdc5.exe9cd98210bf.exee77aa1fdf1.exe7ff87bbfc0.exeskotes.exeskotes.exe5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine d6ba7acdc5.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 9cd98210bf.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine e77aa1fdf1.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 7ff87bbfc0.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Wine 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 6988 service123.exe 6164 service123.exe 1096 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
7ff87bbfc0.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7ff87bbfc0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7ff87bbfc0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e77aa1fdf1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007543001\\e77aa1fdf1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7b303e34cb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007544001\\7b303e34cb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7ff87bbfc0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007545001\\7ff87bbfc0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9cd98210bf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007542001\\9cd98210bf.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007544001\7b303e34cb.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exed6ba7acdc5.exe9cd98210bf.exee77aa1fdf1.exe7ff87bbfc0.exeskotes.exeskotes.exepid process 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe 2372 skotes.exe 4748 d6ba7acdc5.exe 4652 9cd98210bf.exe 2008 e77aa1fdf1.exe 4348 7ff87bbfc0.exe 3916 skotes.exe 6816 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exedescription ioc process File created C:\Windows\Tasks\skotes.job 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6228 4748 WerFault.exe d6ba7acdc5.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exeservice123.exe9cd98210bf.exe7b303e34cb.exetaskkill.exetaskkill.exed6ba7acdc5.exee77aa1fdf1.exe7ff87bbfc0.exeschtasks.exe5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exetaskkill.exetaskkill.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9cd98210bf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b303e34cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6ba7acdc5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e77aa1fdf1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ff87bbfc0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exed6ba7acdc5.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d6ba7acdc5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d6ba7acdc5.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4088 taskkill.exe 2276 taskkill.exe 404 taskkill.exe 724 taskkill.exe 2444 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exed6ba7acdc5.exe9cd98210bf.exee77aa1fdf1.exe7b303e34cb.exe7ff87bbfc0.exechrome.exeskotes.exeskotes.exepid process 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe 2372 skotes.exe 2372 skotes.exe 4748 d6ba7acdc5.exe 4748 d6ba7acdc5.exe 4652 9cd98210bf.exe 4652 9cd98210bf.exe 2008 e77aa1fdf1.exe 2008 e77aa1fdf1.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 4348 7ff87bbfc0.exe 4348 7ff87bbfc0.exe 388 chrome.exe 388 chrome.exe 4348 7ff87bbfc0.exe 4348 7ff87bbfc0.exe 4348 7ff87bbfc0.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3916 skotes.exe 3916 skotes.exe 6816 skotes.exe 6816 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 388 chrome.exe 388 chrome.exe 388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exechrome.exe7ff87bbfc0.exefirefox.exedescription pid process Token: SeDebugPrivilege 4088 taskkill.exe Token: SeDebugPrivilege 2276 taskkill.exe Token: SeDebugPrivilege 404 taskkill.exe Token: SeDebugPrivilege 724 taskkill.exe Token: SeDebugPrivilege 2444 taskkill.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeDebugPrivilege 4348 7ff87bbfc0.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeShutdownPrivilege 388 chrome.exe Token: SeCreatePagefilePrivilege 388 chrome.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 3552 firefox.exe Token: SeDebugPrivilege 3552 firefox.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe7b303e34cb.exefirefox.exechrome.exepid process 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 388 chrome.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
7b303e34cb.exefirefox.exepid process 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3552 firefox.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe 3348 7b303e34cb.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 3552 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exeskotes.exe7b303e34cb.exefirefox.exed6ba7acdc5.exechrome.exefirefox.exedescription pid process target process PID 4356 wrote to memory of 2372 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe skotes.exe PID 4356 wrote to memory of 2372 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe skotes.exe PID 4356 wrote to memory of 2372 4356 5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe skotes.exe PID 2372 wrote to memory of 4748 2372 skotes.exe d6ba7acdc5.exe PID 2372 wrote to memory of 4748 2372 skotes.exe d6ba7acdc5.exe PID 2372 wrote to memory of 4748 2372 skotes.exe d6ba7acdc5.exe PID 2372 wrote to memory of 4652 2372 skotes.exe 9cd98210bf.exe PID 2372 wrote to memory of 4652 2372 skotes.exe 9cd98210bf.exe PID 2372 wrote to memory of 4652 2372 skotes.exe 9cd98210bf.exe PID 2372 wrote to memory of 2008 2372 skotes.exe e77aa1fdf1.exe PID 2372 wrote to memory of 2008 2372 skotes.exe e77aa1fdf1.exe PID 2372 wrote to memory of 2008 2372 skotes.exe e77aa1fdf1.exe PID 2372 wrote to memory of 3348 2372 skotes.exe 7b303e34cb.exe PID 2372 wrote to memory of 3348 2372 skotes.exe 7b303e34cb.exe PID 2372 wrote to memory of 3348 2372 skotes.exe 7b303e34cb.exe PID 3348 wrote to memory of 4088 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 4088 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 4088 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 2276 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 2276 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 2276 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 404 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 404 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 404 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 724 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 724 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 724 3348 7b303e34cb.exe taskkill.exe PID 2372 wrote to memory of 4348 2372 skotes.exe 7ff87bbfc0.exe PID 2372 wrote to memory of 4348 2372 skotes.exe 7ff87bbfc0.exe PID 2372 wrote to memory of 4348 2372 skotes.exe 7ff87bbfc0.exe PID 3348 wrote to memory of 2444 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 2444 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 2444 3348 7b303e34cb.exe taskkill.exe PID 3348 wrote to memory of 4104 3348 7b303e34cb.exe firefox.exe PID 3348 wrote to memory of 4104 3348 7b303e34cb.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4104 wrote to memory of 3552 4104 firefox.exe firefox.exe PID 4748 wrote to memory of 388 4748 d6ba7acdc5.exe chrome.exe PID 4748 wrote to memory of 388 4748 d6ba7acdc5.exe chrome.exe PID 388 wrote to memory of 2320 388 chrome.exe chrome.exe PID 388 wrote to memory of 2320 388 chrome.exe chrome.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe PID 3552 wrote to memory of 4072 3552 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe"C:\Users\Admin\AppData\Local\Temp\5161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\1007541001\d6ba7acdc5.exe"C:\Users\Admin\AppData\Local\Temp\1007541001\d6ba7acdc5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb5280cc40,0x7ffb5280cc4c,0x7ffb5280cc585⤵PID:2320
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2388,i,5914095316596257427,5789659457567143632,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2384 /prefetch:25⤵PID:3976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1712,i,5914095316596257427,5789659457567143632,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:35⤵PID:3472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1964,i,5914095316596257427,5789659457567143632,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2548 /prefetch:85⤵PID:1712
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,5914095316596257427,5789659457567143632,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3136 /prefetch:15⤵
- Uses browser remote debugging
PID:2960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3100,i,5914095316596257427,5789659457567143632,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:3572
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4572,i,5914095316596257427,5789659457567143632,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4516 /prefetch:15⤵
- Uses browser remote debugging
PID:6224
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6988
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4748 -s 18004⤵
- Program crash
PID:6228
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007542001\9cd98210bf.exe"C:\Users\Admin\AppData\Local\Temp\1007542001\9cd98210bf.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4652
-
-
C:\Users\Admin\AppData\Local\Temp\1007543001\e77aa1fdf1.exe"C:\Users\Admin\AppData\Local\Temp\1007543001\e77aa1fdf1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\1007544001\7b303e34cb.exe"C:\Users\Admin\AppData\Local\Temp\1007544001\7b303e34cb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1848 -prefMapHandle 1852 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {dbf3bf22-4019-427e-91dd-38471977d3cc} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" gpu6⤵PID:4072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2324 -parentBuildID 20240401114208 -prefsHandle 2252 -prefMapHandle 2232 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {929f887d-7949-463c-8d49-b29af08c6960} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" socket6⤵PID:2004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3104 -childID 1 -isForBrowser -prefsHandle 3128 -prefMapHandle 3120 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2782898c-ccd3-4b1c-89cd-a78447c3fea4} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4080 -childID 2 -isForBrowser -prefsHandle 4072 -prefMapHandle 4068 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f7f0136e-7624-4127-a5ba-0b2c32be03a9} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:5328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4796 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 1096 -prefMapHandle 4480 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d488b13c-e265-4a3e-bb23-d2e85c39529a} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" utility6⤵
- Checks processor information in registry
PID:6132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5272 -childID 3 -isForBrowser -prefsHandle 5288 -prefMapHandle 5180 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e17f3b4c-ab82-409c-82ab-f66b0825ee9e} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:7000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5360 -childID 4 -isForBrowser -prefsHandle 5236 -prefMapHandle 5276 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6e4d1b2a-245b-4e53-b90c-4d440dc43b03} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:7008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5760 -childID 5 -isForBrowser -prefsHandle 5612 -prefMapHandle 5608 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 980 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {993a593e-cab2-46ba-b0dd-927118520ee2} 3552 "\\.\pipe\gecko-crash-server-pipe.3552" tab6⤵PID:7052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007545001\7ff87bbfc0.exe"C:\Users\Admin\AppData\Local\Temp\1007545001\7ff87bbfc0.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5220
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4748 -ip 47481⤵PID:5244
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3916
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6164
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6816
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1096
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5c23208346c5bc986bb157c0cfad9deaf
SHA1a613f6cfca2ea6c0361989f7fb2fe27f75bfd4cb
SHA256c35efa1fa36535fb4eabb22fdd0634e1ca728a4e4738d8673357b718e5e3ee55
SHA512b49bec192af7f2b9c72b5cf5866e5ce11d6a5c7b52c9247a262ad597d7971b597a04cb26118da9bd5992730668361e14ac9bdc4bc6440c6455df666657e42ab7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\4ws2kncw.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5d7b0fdb88a7c110fb2a8b1318032a890
SHA1da587a7c393c36fad28c27b57a5996a0c20cc649
SHA256949e67f8e44b57f0550951583428b19c3293ef53aeb59d06b5dc55407252e84d
SHA51221b8ced72ad5864b238769e7aca312b76465a5c54b4d2a83136a7d4a6047459f15b541b169869159568394da7b12795868ed876d3f3e81049660ae12a6158e42
-
Filesize
4.1MB
MD5eeafcff9019f6db830551b94ded6ec31
SHA10177b0c665ce005f1a82cea394af45fcc798331e
SHA256b51c39f9a5b2176d0e3a06036460db52d19a94cb4827cf523c00a2e567fd586e
SHA512b37a82d84d1573d908cbbb57422bb4965329204f84452083bfdaa346feeca77db147eae51528d292c7ed477c3c97b0a88d48c23cde522208d200db768f6ecf55
-
Filesize
1.8MB
MD5de0479866482075eead948de5ed353ef
SHA1817c54ba06830e3fa579bb53b21d95ce2af37e80
SHA256508dc6038db822c21cce37bc9aac1694637abe532b5edf89942a829074639e0d
SHA5129bd2cf13a30cdc2836fa82ec056db9ca0c9f94ce7e1d0446d0a72e1d3b985c09ba2aeaf5099ad79eb8450c68e76c01aeca03cf6a1715d5cad6eeac7280b7f2f3
-
Filesize
1.7MB
MD5ed06943d9d911219cd6f78939799044b
SHA150aa51c40a252a5ba8a387413c469fb110ca13be
SHA2563f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf
SHA5122f05d1b8328bf6178dffaa6941106496e1dfd53a8ad793ac236d3aa98f5332c5cc4250552a10f566af563e072bb0e7506007f6aac26bf44bbfab963269500ce2
-
Filesize
900KB
MD5b02583abf5640a7b340e3856d1d97b7a
SHA1aaa40e9fea46884fc01d20a2072d915e0ba413cb
SHA2564ade4fbaba2bb171fe05f150f8376c3daa7d7c79e0ecebcaa0a15aaeb1d31632
SHA5126621203ffa697fabe3e986f033e6da5534d233557d709f9529d485636e0cb4254da760cbb72562523526195f4e4ba6042acfce842a0fea338efe14943b02bf4c
-
Filesize
2.6MB
MD5a0b198a5fd53cfff7e90ad121b4c40a7
SHA191ffbf7e61f3fe5b8fea9edc95c0a07eac19d842
SHA25654fba3007a5aa7435b178f3ed61e22f3643c9fdd49cb845290ff15be84dc58b3
SHA512da04642e10465d16a44ba12d4262804bbf4a7ac40591cadcc550c7d6008c6acaeb6a5ef5646bd0dfdbb071ce66929bd1d6cb65be8df2a538740e8ca196e7297c
-
Filesize
1.8MB
MD522ee1495ad3fd1a2a7f4e210e6932916
SHA1a3879ccd26a8b8cbfaa6492f1b75ddd9472b3783
SHA2565161e963b4f92b7c6feef9a626f6f4afc0454eb363a6c39ac741e9e1ade5fa77
SHA512d6493a668032c3b31c517545fbef0c3418ad220aaf0b4621d02e0a9a96101efcbf966ea034d258af09c38d2a0c00c2921e7e293480a4a42e7ee1753a7a4eb663
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize6KB
MD5d292dfa3046044a578439bf8b644695c
SHA11c190b8ca980f179480cdd3ad84e2924f56ca905
SHA2566f49d38117b0b9b8ef612f5081cd715be7cf113c63b7ce2f6925d43ef2a0e5ac
SHA5122e7b5cb8fa4d9694fde221beb8bea758c259f8f9ac8def8e375b393cec3d6e448f075242412d55570fcf14b39c9ac7f4dfdcd940619ae4f9fc8ad3d7cf9ac2f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize10KB
MD5c9c24c2877c06a4c4027dddd5fcbe870
SHA1e343d76cfb1fcf03664898d5cd40dfea7e29ad97
SHA256644e86096f9d29bfe89f5364da5311802fe2743291060240e0a9c0c4ae990072
SHA512e78c757d25d5bb839dc6abcf3ff1b39e4352ef37f4f697b5898c586eee8cde358dc7904dd131819a868007fa955288e886a48b3803a42fe93cedd03c28c2a6a4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\AlternateServices.bin
Filesize13KB
MD59330f6db0eae54f971c42ea4c2b6e591
SHA10a8c2196da0ea0c4ed4c77fac8fbbbbe72600ac3
SHA256d62685d0ad520addeb20c19e2ef2c57f7485eac8b715c08a95e8b18407690219
SHA512a9431dbd2be91981082ed94f1aa014cf4280938ded133f2baf11de331bfd0d969900ff8c5c6136fefa809e4354f0d996a0a671d66a629cd73311007eae406e1e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD51c8af49ed2786bd99b52b4f24e3ef6de
SHA1ddf82fa9bc9f2f8324c2cb07244f7ad0cf17f0e4
SHA2562b0cabe78f31a1a545865250b752759b209d8289fcb271f61ad19d5f2eda3d0e
SHA512d02be70e5306353ad5b3a6ed9d713c2e6e4363b8cea751aaa3d6fefba3f5c7021b2a499acc5caed334d5455c837563cf3231397df08bbd1506413048818aea56
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD525ab8c00510bd3cc95b07deecbe92bca
SHA1ed0112b2de36e7d155f4b04beba6afc5087f677d
SHA25601df17434a5e5abe5487df7dfab3d06e3b1eb3147069ed03550b028708007797
SHA512093bdf9e83cfbb90ef388894d0ddf4ef7d651a6a2006b8b67dbb7e0f88d6f3c67af0f32535d041d591ef8996676713e72c245f5f2a9db10989559f5bc2200fb3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD522ceb7ba7f7f5ada1907e6777632384a
SHA1601727c3abf5358464adf86ed4e83c348986be7c
SHA25630f907b1551808d83db5ee1824430423f87b94437f0e18fcf2c8602bb1dec8a5
SHA512b5853927ef38ca266ff0d52ad7cbcf72eb6e61558e7c6f48257c23e7550d4574daca43fafc0fb5b72fd3433fc5ffb887fe62784de5433f94a8c25d88c7665bf0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD53091e69bd99a9928a2210d9ca5f5b6e8
SHA1da8296f926610a2056e5f2e537bcfcd204c6227a
SHA256ec8cab65b7d66fd0535f9d7adf6584e2d273b2cf02ff5c494bc00838f08c22f7
SHA51286fa746c42c2db93f42dfd1c5d0a71d149ea516a13fdfe10ae055b1a2748aed22614675929672c3de93361cace82805b0873a72e69223e3cdbc1c05bf4884d8d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\68f0d137-f520-4d75-a0f7-9b717847660e
Filesize659B
MD56d28f2c225423fcfc828cd0c7d203dbe
SHA1d237ee2ca898a3587f59b555c4fff11c2d8115de
SHA256497da734ac3a40d1395b7ea225a9872d8dee960ce22c73d0f32a2cdba9edf26f
SHA5122c44e54f733bd08519bd70b94757935f40be2206c0337d7d6d894d849aaba6f5a6819932d394341abafdfbea3f24a5ff81d0840ddbf3f4ec8fbd1c6b87b59ea6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\datareporting\glean\pending_pings\f48f2f5c-4570-4a98-bd36-a73015e53b85
Filesize982B
MD5393671183ff80d3be3ced60871c0563b
SHA1a7a2bd88096e0e3629658969ab883c2bf4c14bd7
SHA25610677756a51cb3c7d63b6a0e64650ced76fe8fd0a060910779d776e1c4136a68
SHA5126fe8731d4e44b85036dd725432d94dce0365056ae32f51394c10d0e89b82d1f5e61396e59b57571cabd1a20cb45bed7f5e324df04fe734f10c1145c800b874ff
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\4ws2kncw.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD598d9da9b2d820b636dcb528b484be9ab
SHA1a2b0dd63b879d780e09bc329db39947d0ca6ae36
SHA256757aa9d9b54768860e382051d17ddca290b352f054fb7bfd1291c77ad6cbeb2d
SHA5127afb002fd19904c54cce5a43cb8673ad885227e1deae1e59355b9227f2e44405109d5f054f93bae895552765129e35372d4940deaff6a68c70837596533be13e
-
Filesize
10KB
MD543813f85a173e4dc49961970dc2caa8e
SHA19dced5937c3e0784fec7a45780915bc14d12fdf7
SHA256430bf15d11d9093d557e1be23bf057ac4187e164d0c9341121dc76efb46ffa8b
SHA512fc5f27f631f5724876a6806dca6c58ddf7cd42eac5d8bda4a0bd45fc3754c50e756659fdef47610cc9dc303147ecc32f6a173bc33ea432d3e082face13a3d11a
-
Filesize
15KB
MD505542e3c57490687b9eb00468a84aec2
SHA133e5a1cae8055373cdb9638efa2c938d739d892b
SHA256f218ed83bebcb5690607340da104bf97f1330efc04d31bfe38e2fc893616cea7
SHA512e85548fb4a633a070b9424ff8dc3ef6102c065fabb9eb86f1e4fff5212337536817cb693656eefc803668f679639ed7007a62088e6582f0790321bdd20803f96
-
Filesize
11KB
MD599504222a0155e5927c323c0bc3158d0
SHA1a88fc02328d134b7949dd9fd5c7ce7d1479cd279
SHA2564f27bb0b27e6f73091ebe7d42b2fd2b3c2e624b486f893a4a170089fe541313b
SHA512407c53bac410bad33b35320cb336d88e5a90cf1a91e44a2f44ea333b873c50f7cf008d4ffb17800725260221fcf47bf809e549e535b4c6ecf36cd2b96fbb780d
-
Filesize
10KB
MD59157788cb16ea5fb7c2bb29da64b53fe
SHA12a58375f6293fda0f3e3c6270e55f647a0151c92
SHA25672f7243b24d50e414394faf1922b2735a4f7549387c315e5e615550fa3cbc414
SHA512b278dafc1e8c314ec3df4f511485d8a41c7678984d604872a0680ae4f6f358c527c15aa09dd6445bf1edef2d28b8ff63f220574d82b8ac4f0c95441b0d5d0075
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e