Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 01:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
68c848d7232e6525935d7e337f37d624
-
SHA1
6cef0f74d1fbb478d975eaf516a881c3fd833b15
-
SHA256
6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3
-
SHA512
1aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310
-
SSDEEP
49152:4DGXEI7OU0hl2LQAGNWGFuC/ywcldX2wZads+gH5:+LI7f0+qFAC/Asi5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b639268743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b639268743.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection b639268743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b639268743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b639268743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b639268743.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e90117934a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d69840b858.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b639268743.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e90117934a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e90117934a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d69840b858.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b639268743.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b639268743.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d69840b858.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 4068 skotes.exe 1300 e90117934a.exe 4940 d69840b858.exe 3648 d743c7a62d.exe 5396 b639268743.exe 3264 skotes.exe 5564 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine e90117934a.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine d69840b858.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine b639268743.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features b639268743.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b639268743.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e90117934a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007542001\\e90117934a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d69840b858.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007543001\\d69840b858.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d743c7a62d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007544001\\d743c7a62d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b639268743.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007545001\\b639268743.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b6d-67.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1548 file.exe 4068 skotes.exe 1300 e90117934a.exe 4940 d69840b858.exe 5396 b639268743.exe 3264 skotes.exe 5564 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e90117934a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d69840b858.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d743c7a62d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b639268743.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4828 taskkill.exe 2800 taskkill.exe 4684 taskkill.exe 2624 taskkill.exe 2184 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 1548 file.exe 1548 file.exe 4068 skotes.exe 4068 skotes.exe 1300 e90117934a.exe 1300 e90117934a.exe 4940 d69840b858.exe 4940 d69840b858.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 5396 b639268743.exe 5396 b639268743.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 5396 b639268743.exe 5396 b639268743.exe 5396 b639268743.exe 3264 skotes.exe 3264 skotes.exe 5564 skotes.exe 5564 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2184 taskkill.exe Token: SeDebugPrivilege 4828 taskkill.exe Token: SeDebugPrivilege 2800 taskkill.exe Token: SeDebugPrivilege 4684 taskkill.exe Token: SeDebugPrivilege 2624 taskkill.exe Token: SeDebugPrivilege 3788 firefox.exe Token: SeDebugPrivilege 3788 firefox.exe Token: SeDebugPrivilege 5396 b639268743.exe Token: SeDebugPrivilege 3788 firefox.exe Token: SeDebugPrivilege 3788 firefox.exe Token: SeDebugPrivilege 3788 firefox.exe -
Suspicious use of FindShellTrayWindow 31 IoCs
pid Process 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3788 firefox.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe 3648 d743c7a62d.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3788 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1548 wrote to memory of 4068 1548 file.exe 86 PID 1548 wrote to memory of 4068 1548 file.exe 86 PID 1548 wrote to memory of 4068 1548 file.exe 86 PID 4068 wrote to memory of 1300 4068 skotes.exe 91 PID 4068 wrote to memory of 1300 4068 skotes.exe 91 PID 4068 wrote to memory of 1300 4068 skotes.exe 91 PID 4068 wrote to memory of 4940 4068 skotes.exe 93 PID 4068 wrote to memory of 4940 4068 skotes.exe 93 PID 4068 wrote to memory of 4940 4068 skotes.exe 93 PID 4068 wrote to memory of 3648 4068 skotes.exe 96 PID 4068 wrote to memory of 3648 4068 skotes.exe 96 PID 4068 wrote to memory of 3648 4068 skotes.exe 96 PID 3648 wrote to memory of 2184 3648 d743c7a62d.exe 97 PID 3648 wrote to memory of 2184 3648 d743c7a62d.exe 97 PID 3648 wrote to memory of 2184 3648 d743c7a62d.exe 97 PID 3648 wrote to memory of 4828 3648 d743c7a62d.exe 99 PID 3648 wrote to memory of 4828 3648 d743c7a62d.exe 99 PID 3648 wrote to memory of 4828 3648 d743c7a62d.exe 99 PID 3648 wrote to memory of 2800 3648 d743c7a62d.exe 101 PID 3648 wrote to memory of 2800 3648 d743c7a62d.exe 101 PID 3648 wrote to memory of 2800 3648 d743c7a62d.exe 101 PID 3648 wrote to memory of 4684 3648 d743c7a62d.exe 103 PID 3648 wrote to memory of 4684 3648 d743c7a62d.exe 103 PID 3648 wrote to memory of 4684 3648 d743c7a62d.exe 103 PID 3648 wrote to memory of 2624 3648 d743c7a62d.exe 105 PID 3648 wrote to memory of 2624 3648 d743c7a62d.exe 105 PID 3648 wrote to memory of 2624 3648 d743c7a62d.exe 105 PID 3648 wrote to memory of 1368 3648 d743c7a62d.exe 107 PID 3648 wrote to memory of 1368 3648 d743c7a62d.exe 107 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 1368 wrote to memory of 3788 1368 firefox.exe 108 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 PID 3788 wrote to memory of 4840 3788 firefox.exe 109 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\1007542001\e90117934a.exe"C:\Users\Admin\AppData\Local\Temp\1007542001\e90117934a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1300
-
-
C:\Users\Admin\AppData\Local\Temp\1007543001\d69840b858.exe"C:\Users\Admin\AppData\Local\Temp\1007543001\d69840b858.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Users\Admin\AppData\Local\Temp\1007544001\d743c7a62d.exe"C:\Users\Admin\AppData\Local\Temp\1007544001\d743c7a62d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b738280e-802c-4c84-80ac-761c839b9647} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" gpu6⤵PID:4840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e6c64c30-2b9a-4e6a-88f5-301644f7dd31} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" socket6⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3188 -childID 1 -isForBrowser -prefsHandle 1704 -prefMapHandle 3248 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1240 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39c96f6a-b291-488b-a933-46a672d163db} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" tab6⤵PID:2196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3900 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3916 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1240 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0cca9a1-9398-4d18-9667-97797e99eeed} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" tab6⤵PID:3728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4712 -prefMapHandle 4708 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67765aa1-f2a7-498f-b1f7-b3fe5ef4792b} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" utility6⤵
- Checks processor information in registry
PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4128 -childID 3 -isForBrowser -prefsHandle 2592 -prefMapHandle 5268 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1240 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {621ef5fe-97e1-469a-ba84-66fac1092ccb} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" tab6⤵PID:6008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 4 -isForBrowser -prefsHandle 5384 -prefMapHandle 5388 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1240 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2a3ac749-85d0-45da-8434-11e9ce366640} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" tab6⤵PID:6020
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5560 -childID 5 -isForBrowser -prefsHandle 5568 -prefMapHandle 5344 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1240 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d53e01d9-a678-404c-92ea-e010350975f3} 3788 "\\.\pipe\gecko-crash-server-pipe.3788" tab6⤵PID:6032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007545001\b639268743.exe"C:\Users\Admin\AppData\Local\Temp\1007545001\b639268743.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5396
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5564
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD55cc2a359d0bde4b9fd4da9207fc75d90
SHA1f8cf8e33f5a1b3cdb3d7f6a59d0969ebe9cf2b68
SHA25697b9ed65cbd3380fbde8d5f57c66daf4a4ed10b564241258d15b1d1bc6e6457b
SHA512a11bb991ab4d42e56a335fbc4e86f2183ab50c80d0d31d2ae484b579dcce298fa46b423e9262712f29d2faa68ae84d68f5527495adaafc77a1a7ea244dde1795
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD568ae67ef0ab7190fe0ee2e2ded622e10
SHA1c2787acfab338bcb174d302060230f1a03519084
SHA2569b94d7f510ccb565d659595c75b70093461dabe36e23f12b72cf6e3713f5cd63
SHA512713651d4b8434c7a2439be44f56e40b0c15c6790b4e4e03284e683d930388ed5274a21d7a9762469f1a32bfe7453206ddd56dc918f41f6a45b335384e38d8d8a
-
Filesize
1.8MB
MD5de0479866482075eead948de5ed353ef
SHA1817c54ba06830e3fa579bb53b21d95ce2af37e80
SHA256508dc6038db822c21cce37bc9aac1694637abe532b5edf89942a829074639e0d
SHA5129bd2cf13a30cdc2836fa82ec056db9ca0c9f94ce7e1d0446d0a72e1d3b985c09ba2aeaf5099ad79eb8450c68e76c01aeca03cf6a1715d5cad6eeac7280b7f2f3
-
Filesize
1.7MB
MD5ed06943d9d911219cd6f78939799044b
SHA150aa51c40a252a5ba8a387413c469fb110ca13be
SHA2563f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf
SHA5122f05d1b8328bf6178dffaa6941106496e1dfd53a8ad793ac236d3aa98f5332c5cc4250552a10f566af563e072bb0e7506007f6aac26bf44bbfab963269500ce2
-
Filesize
900KB
MD5b02583abf5640a7b340e3856d1d97b7a
SHA1aaa40e9fea46884fc01d20a2072d915e0ba413cb
SHA2564ade4fbaba2bb171fe05f150f8376c3daa7d7c79e0ecebcaa0a15aaeb1d31632
SHA5126621203ffa697fabe3e986f033e6da5534d233557d709f9529d485636e0cb4254da760cbb72562523526195f4e4ba6042acfce842a0fea338efe14943b02bf4c
-
Filesize
2.6MB
MD5a0b198a5fd53cfff7e90ad121b4c40a7
SHA191ffbf7e61f3fe5b8fea9edc95c0a07eac19d842
SHA25654fba3007a5aa7435b178f3ed61e22f3643c9fdd49cb845290ff15be84dc58b3
SHA512da04642e10465d16a44ba12d4262804bbf4a7ac40591cadcc550c7d6008c6acaeb6a5ef5646bd0dfdbb071ce66929bd1d6cb65be8df2a538740e8ca196e7297c
-
Filesize
1.8MB
MD568c848d7232e6525935d7e337f37d624
SHA16cef0f74d1fbb478d975eaf516a881c3fd833b15
SHA2566a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3
SHA5121aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD53e378204167e08d9c8a7e60009b43446
SHA1d4eb657d013175887423fc4a8629075f0ba85de5
SHA256eaa1d6919f264340810bf77e05e53550929aa217f55cf4b25fc0acaebf483b49
SHA5127e563da8a25f917cdf82f40834ba6103d584e7b5e1f048fecf5a21eb63f0673c843b8d1068257c7334ae056940bdfb131e92886fbea99e7e95381a8df494b3e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD51530e6fc2eb5c062659f2790ad61510a
SHA1eb02e312b760e5b0e108169f9c21b90e65a6a6f5
SHA2563e3c0aac89abda6da351fb396ec56973ca88a2f4b3852341d37407b98c2252d1
SHA51201d0df70d63b4480602cf1b160da12bccfc68dc1d4d71ad240a09999afebdd9e2f951a2be8624ec9dead8f2ee31d353f6ccdf61961ab81dafc2b1332119a2def
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize10KB
MD56d86e6d13eda5c687fc07674c8fba17d
SHA17d777352ca6c1823490207fe7d482854ce1768fc
SHA256447e73b853641ffc494e9bd22ac3a75afb04ec20fcd0d54ac3aea46eca7df95d
SHA51297adaa655ac9cc17f435525f29af6e73f4a5826c9be47c28fc40506ef668ffabeba76788b40e118f90d868cd67b8b67dc6c4fabffaa23b36a5e21290b1735e33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize20KB
MD597521bd5487b045a86505e33982c0816
SHA1fcaf651f1075bdb6dd6010328446c697fd5ed728
SHA256f7a972fd0f8af1c5fb6cd345566c9f8bc803c12e254fc93236bbb902c12bd926
SHA51244b46a40b89a62fad7a2546aa0c9a4857c1a5cdacb618f520d8c7e7e2a5c007188fbf044d81e77c5cabc2565e0e8eb272f3b0204f6c8893a7d259474a875b274
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5709fc6659ee923160f3219b78d00d94b
SHA16833abf377d46531578001f8a6fdaaef1dae017d
SHA256034251cc7517caebc08669aef625b5ab6a3377e7c669ba879000444d55643940
SHA5129ade3e2e03108afdb0d60c55f2ffe578e8b4b93d03da755e24e5965016fa3318a35c19e200ba8b25d1384bc03b414505a08ad4feb5bd90508c8562c01f3b37bf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD576229192681af2718964d5f1b944ea1d
SHA13e9eb42c5d53fd4c29d22b51b333b349efcf6df2
SHA256fed1128e663e78b4da3d44c6eb8d9333d6af6e9c92ca2e50034e273fe4d95753
SHA5128dcf7d535a831e18a387f0e5dcce83a1eeb8b35e776dcc3c56c8840878918a2eb84929cc166b4bbc8b85eb418193cb9268604074923689b554b3305ffc883c45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\1aca6121-85b4-4ac3-8b75-5b2f38480faa
Filesize659B
MD53513e6c671eb170907d3d1c51b5b0824
SHA18c9401e4d57cbfbd56f8c59e38ea6dea21a4df28
SHA256014e707b42581c87f111cefd7e147f4ecdda0bd1e352e8e0d7ab758bd9ca786e
SHA51229a100637bef882bc51b6ece858bebbb72d86b9e22c6caeff52906ebfec210466bea56da1e72c97555d000e2940b5ea31ef4f2d91ad03cf18a2c79b2294c934d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\1b5d5b13-a1a5-4151-aee8-726e77645ff5
Filesize982B
MD520c38939fca1c1a2dda44a237dd01306
SHA15b0621eb9b57cc65efbe716a9e9eb14ed72b4e56
SHA256baaa4cf93a4df98a03ddde7de814e2659e8fced1e5adf4ca5d200e861f46ff1f
SHA512e0f4b8db290450e534c00b9287aaa6b0206c3e94e587ed1d405e52e4638bbc2e2553d9e284d4d7c681a964a7490e4c21aa31ca9c58d5f28c12003e6883b6cb89
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD57a6024bc9a5a701966d3f22ef88c74ee
SHA1a580716de05eb17a7d61c2a8a3853ba2c3aaa137
SHA256785c50f7495c3f604a488c9b193f9109fc53fea44e97e18155c4bf50b909e2ab
SHA512e9c101a1aa6596d78ee86555870c80dc2df70fcf703af4f06663d59ab7cc63b1a7dab17a159060732bb9d443124d714f8c480475ab7c88c2267d2b0fee591729
-
Filesize
15KB
MD5557f9f6d506e6db80ab1dae19419479c
SHA1bba03d0fd3d4165012ddea3139c3163a3f6e9152
SHA256b6e974ebede59c2713bc976a628d11d4b47afda6c704ee85d070712f337eda36
SHA512ac667e80ed1c5444cc4c94ddd6b03983d9b73ca1cd0d28ca9e61217f305a521ea0f863e6043173045e02efd13e36a7e5c9eda715b27758d5151b233dc8626336
-
Filesize
10KB
MD5b9a8da84875830b5204e146727a163ab
SHA1233fcef9425fbed7b042a8297b2504006a157b2d
SHA256c6978493c022730171ecfb789bbf5796d4b927ec2e95e13b020303df84d14e73
SHA51231545b6561d980f67611b6341f8f54592fc53b3f767422af486bb7f47032a3f72e6ab3dbad97166b9f61d996337c210b5e0030342148e6221e383feaea55662b