Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 02:30
Static task
static1
Behavioral task
behavioral1
Sample
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe
Resource
win7-20241023-en
General
-
Target
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe
-
Size
1.8MB
-
MD5
1b80b47dce750b56636e05526c3335f5
-
SHA1
f59b0dddf4f7e0b105946bf697440305c0a46998
-
SHA256
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a
-
SHA512
d1a23fd292538ba5beb16e8590f276b2f0cd941158aef2f1ff70c12418441189ddddff84cfd50a6c1b5b22f8a654679098c27a7d0fbac2cf755f96dedbfdfffa
-
SSDEEP
49152:G9EeR/Onr598rIpzua/Q3g5CwgbtSwarNMrAiVQ9L:GRR08rIYa/ytxA7iVM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4988-80-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
0536ed5be2.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 0536ed5be2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 0536ed5be2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 0536ed5be2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 0536ed5be2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 0536ed5be2.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 0536ed5be2.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
60799a768a.exe39b971fdc7.exeabf8b25d9c.exe0536ed5be2.exeskotes.exeskotes.exe36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60799a768a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 39b971fdc7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ abf8b25d9c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0536ed5be2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5704 chrome.exe 2864 chrome.exe 1752 chrome.exe 5140 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exeskotes.exe0536ed5be2.exeskotes.exe36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe60799a768a.exeabf8b25d9c.exe39b971fdc7.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0536ed5be2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60799a768a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0536ed5be2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60799a768a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion abf8b25d9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion abf8b25d9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 39b971fdc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 39b971fdc7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exe60799a768a.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 60799a768a.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exe60799a768a.exe39b971fdc7.exeabf8b25d9c.exec1f2250d04.exe0536ed5be2.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4872 skotes.exe 4988 60799a768a.exe 3612 39b971fdc7.exe 2808 abf8b25d9c.exe 4544 c1f2250d04.exe 1552 0536ed5be2.exe 5592 skotes.exe 4128 service123.exe 5604 skotes.exe 2068 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exe60799a768a.exe39b971fdc7.exeabf8b25d9c.exe0536ed5be2.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 60799a768a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 39b971fdc7.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine abf8b25d9c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 0536ed5be2.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 4128 service123.exe 2068 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
0536ed5be2.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 0536ed5be2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 0536ed5be2.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\39b971fdc7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007555001\\39b971fdc7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\abf8b25d9c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007556001\\abf8b25d9c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1f2250d04.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007557001\\c1f2250d04.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0536ed5be2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007558001\\0536ed5be2.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007557001\c1f2250d04.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exe60799a768a.exe39b971fdc7.exeabf8b25d9c.exe0536ed5be2.exeskotes.exeskotes.exepid process 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe 4872 skotes.exe 4988 60799a768a.exe 3612 39b971fdc7.exe 2808 abf8b25d9c.exe 1552 0536ed5be2.exe 5592 skotes.exe 5604 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exedescription ioc process File created C:\Windows\Tasks\skotes.job 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3636 4988 WerFault.exe 60799a768a.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
39b971fdc7.exetaskkill.exetaskkill.exetaskkill.exeservice123.exe36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exec1f2250d04.exetaskkill.exetaskkill.exeabf8b25d9c.exeschtasks.exe60799a768a.exe0536ed5be2.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39b971fdc7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1f2250d04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language abf8b25d9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60799a768a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0536ed5be2.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exe60799a768a.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 60799a768a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 60799a768a.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3768 taskkill.exe 4548 taskkill.exe 2576 taskkill.exe 3772 taskkill.exe 3040 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exe60799a768a.exe39b971fdc7.exeabf8b25d9c.exec1f2250d04.exe0536ed5be2.exechrome.exeskotes.exeskotes.exepid process 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe 4872 skotes.exe 4872 skotes.exe 4988 60799a768a.exe 4988 60799a768a.exe 3612 39b971fdc7.exe 3612 39b971fdc7.exe 2808 abf8b25d9c.exe 2808 abf8b25d9c.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 1552 0536ed5be2.exe 1552 0536ed5be2.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 5704 chrome.exe 5704 chrome.exe 1552 0536ed5be2.exe 1552 0536ed5be2.exe 1552 0536ed5be2.exe 5592 skotes.exe 5592 skotes.exe 5604 skotes.exe 5604 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe0536ed5be2.exechrome.exedescription pid process Token: SeDebugPrivilege 3040 taskkill.exe Token: SeDebugPrivilege 3768 taskkill.exe Token: SeDebugPrivilege 4548 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 3772 taskkill.exe Token: SeDebugPrivilege 2096 firefox.exe Token: SeDebugPrivilege 2096 firefox.exe Token: SeDebugPrivilege 1552 0536ed5be2.exe Token: SeShutdownPrivilege 5704 chrome.exe Token: SeCreatePagefilePrivilege 5704 chrome.exe Token: SeShutdownPrivilege 5704 chrome.exe Token: SeCreatePagefilePrivilege 5704 chrome.exe Token: SeDebugPrivilege 2096 firefox.exe Token: SeDebugPrivilege 2096 firefox.exe Token: SeDebugPrivilege 2096 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exec1f2250d04.exefirefox.exechrome.exepid process 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe 5704 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
c1f2250d04.exefirefox.exepid process 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 2096 firefox.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe 4544 c1f2250d04.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2096 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exeskotes.exec1f2250d04.exefirefox.exefirefox.exedescription pid process target process PID 1808 wrote to memory of 4872 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe skotes.exe PID 1808 wrote to memory of 4872 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe skotes.exe PID 1808 wrote to memory of 4872 1808 36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe skotes.exe PID 4872 wrote to memory of 4988 4872 skotes.exe 60799a768a.exe PID 4872 wrote to memory of 4988 4872 skotes.exe 60799a768a.exe PID 4872 wrote to memory of 4988 4872 skotes.exe 60799a768a.exe PID 4872 wrote to memory of 3612 4872 skotes.exe 39b971fdc7.exe PID 4872 wrote to memory of 3612 4872 skotes.exe 39b971fdc7.exe PID 4872 wrote to memory of 3612 4872 skotes.exe 39b971fdc7.exe PID 4872 wrote to memory of 2808 4872 skotes.exe abf8b25d9c.exe PID 4872 wrote to memory of 2808 4872 skotes.exe abf8b25d9c.exe PID 4872 wrote to memory of 2808 4872 skotes.exe abf8b25d9c.exe PID 4872 wrote to memory of 4544 4872 skotes.exe c1f2250d04.exe PID 4872 wrote to memory of 4544 4872 skotes.exe c1f2250d04.exe PID 4872 wrote to memory of 4544 4872 skotes.exe c1f2250d04.exe PID 4544 wrote to memory of 3040 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3040 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3040 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3768 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3768 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3768 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 4548 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 4548 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 4548 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 2576 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 2576 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 2576 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3772 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3772 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 3772 4544 c1f2250d04.exe taskkill.exe PID 4544 wrote to memory of 4508 4544 c1f2250d04.exe firefox.exe PID 4544 wrote to memory of 4508 4544 c1f2250d04.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 4508 wrote to memory of 2096 4508 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe PID 2096 wrote to memory of 3484 2096 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe"C:\Users\Admin\AppData\Local\Temp\36bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\1007550001\60799a768a.exe"C:\Users\Admin\AppData\Local\Temp\1007550001\60799a768a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4988 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5704 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff83986cc40,0x7ff83986cc4c,0x7ff83986cc585⤵PID:5728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1876,i,4532825299487141256,16028383320868135855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:25⤵PID:3052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1836,i,4532825299487141256,16028383320868135855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2028 /prefetch:35⤵PID:6052
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2140,i,4532825299487141256,16028383320868135855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2296 /prefetch:85⤵PID:5440
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,4532825299487141256,16028383320868135855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:1752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,4532825299487141256,16028383320868135855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:2864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4576,i,4532825299487141256,16028383320868135855,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4240 /prefetch:15⤵
- Uses browser remote debugging
PID:5140
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 13124⤵
- Program crash
PID:3636
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007555001\39b971fdc7.exe"C:\Users\Admin\AppData\Local\Temp\1007555001\39b971fdc7.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3612
-
-
C:\Users\Admin\AppData\Local\Temp\1007556001\abf8b25d9c.exe"C:\Users\Admin\AppData\Local\Temp\1007556001\abf8b25d9c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1007557001\c1f2250d04.exe"C:\Users\Admin\AppData\Local\Temp\1007557001\c1f2250d04.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1908 -prefMapHandle 1900 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {40081225-9944-4ce3-973f-d7b058740e7a} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" gpu6⤵PID:3484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8334b336-9c44-4c6d-a668-35ccc20871ff} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" socket6⤵PID:2752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2816 -childID 1 -isForBrowser -prefsHandle 3172 -prefMapHandle 3192 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f889b186-7a2d-45b7-93f9-8f942c4e5517} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" tab6⤵PID:2456
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3928 -childID 2 -isForBrowser -prefsHandle 3920 -prefMapHandle 3912 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {45c9d4d0-2c37-4681-a0f6-e8a1cccf6c40} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" tab6⤵PID:1628
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4620 -prefMapHandle 3884 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cb04469c-638e-483a-88a5-8c5d7e4a85b7} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" utility6⤵
- Checks processor information in registry
PID:5252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5312 -childID 3 -isForBrowser -prefsHandle 5328 -prefMapHandle 5388 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1eccf10a-ea50-4d96-a0eb-7f64f4f64924} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" tab6⤵PID:2596
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5616 -childID 4 -isForBrowser -prefsHandle 5468 -prefMapHandle 5584 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da7f5fbf-498d-4026-a9c8-1294ebe9449c} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" tab6⤵PID:4444
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5780 -childID 5 -isForBrowser -prefsHandle 5788 -prefMapHandle 5792 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dfdbc233-edcb-483b-9c41-de72cf9fe04e} 2096 "\\.\pipe\gecko-crash-server-pipe.2096" tab6⤵PID:4868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007558001\0536ed5be2.exe"C:\Users\Admin\AppData\Local\Temp\1007558001\0536ed5be2.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1552
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 4988 -ip 49881⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5604
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD56519ab58c259e7f3389637b6f72eab15
SHA122091de408f7c123d334b69abed37f74da924b10
SHA256e46408a84e620880c0965ea756d67a4f1b4d320a43af8697be1b9096d3137c60
SHA512e1dbc68ff163fe074d091e841d8d9fd7e3ff6ed125d284a4d514e6f9499afc5404f2467e415520583a6c2cb572348f28de7c713c4579dde52167cd5563cf0580
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5b70c870b4e23abe06165e402857e8ede
SHA10546c864b0548ace25c9a85f34839e550ea97edc
SHA2565feed017a03e70865d23794efac3a00d65215019157330469b709382e84a572a
SHA512c1aacddaf21f138e9561115a40337e0f9cf183d83390911ced0c52170f038ae20bb081420a4d963d480cc7dc55e06cf0155cff71b012d3b06906ca816318fdf8
-
Filesize
4.2MB
MD52ca191450d69dcbee0485f1c14135040
SHA16cf3997d6e3f246bcad8497476fea2dd792199fa
SHA256d91b3f6f4e566fff74506d30a1a61597c03f07b1f826f393bebfee12cbc8d95d
SHA5128a4241a3cd9531db18b75b5bed1a384daf71a45876f85de6821bcecfdb2c6f7efd67facb35313afe496696a5c73e2b36d6aa17b96b39d1c84593a61a61715e2a
-
Filesize
1.8MB
MD5c6774985fc109440ce01c0bdf1978a96
SHA16c3c8e16544c299ee31175d7796679da0bf33736
SHA256eaa41c656c107cadd3ecd84eb6f9338185db27b7ed156e8244446fa46b3b936b
SHA5129b3bb6f1de8a84cf3163faa52444c993c2ad46981b26e95e00a7d2e7eb3d676c8d8826419b6f1273fdaaa9db7daa0f520186599230b0dff949ad4385a3b5d316
-
Filesize
1.7MB
MD5af00fae5bf606001c0c6ef0b98fb54d0
SHA1a24fe73ec0b2d0190d3f6f068ca3c13a6cde4fd3
SHA2568b1fbd75e6fcdf963260148537cae0d876130656c343518a5d7623937d4f0881
SHA512e08d6691ed7092e2f569391ef89c6b3528630ff449372b064e06ebde2e7de482517e7407c81ce75a190d74936c64a0c31f5acc23efeffe6f54622184f780a5bc
-
Filesize
900KB
MD55ddbda8baef12cdd69941b253fee8aec
SHA157e7be2b1a5a94a521da718c857cc47de4ca51de
SHA256eb24498db31fab6a17b5b5c1eee0e87f46c324b74edc6b76db8ed4c0c66dcdd8
SHA512648e76c6cf42268166e57afa3f9a7b5dadd5ac63eb13898e12098b173eb27b726cf7624b01b0404b3f73bf54d96595c21c2a2e4a991604c76d5aa83bcd32f139
-
Filesize
2.7MB
MD58016e5d93e55bb0356c789bb6ba0bdbe
SHA1d22bb6723ea29ff986bdbcda2943b6f77f9121e6
SHA256683609cf5dad7e5a984bf4ebab65c2fa2a6d59724507b7c5e9d240932f2994a4
SHA51202a0988cdf9fad5e64893c9271ca4b7cd9008214193c713b1e068912461a7e4d01342c97c96ab0091c25c7444705ba516ef7349ead6843f9cfb9127278d1d0c0
-
Filesize
1.8MB
MD51b80b47dce750b56636e05526c3335f5
SHA1f59b0dddf4f7e0b105946bf697440305c0a46998
SHA25636bb93f4ce8de7c518e5c8f574aff6c385d597d0d357fa12294c41b4cdd2926a
SHA512d1a23fd292538ba5beb16e8590f276b2f0cd941158aef2f1ff70c12418441189ddddff84cfd50a6c1b5b22f8a654679098c27a7d0fbac2cf755f96dedbfdfffa
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD517c3299181969bcefa2d684342d9a993
SHA17c6a56d55a45decce8c05dfa7c81170df896ceff
SHA256c1745ab66c13f5d47f9f9cfb7c1c0dfc3c3d58ebc95658d4d502aa1fe4a3396c
SHA512a021fc01d59f686fdcea3061ff366057eb909c5426efaf19e9b4d70e87d9894cfedf1d4ead9f820755b884b290d84413c5b3ec2af4ef8feeb791e28671027409
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize8KB
MD599ca47842821c7e19ed649c2c5b0407a
SHA1432036548ffe2ae2a93befa1cbd0d1612108b8d2
SHA2565f968074f35e30e658265966708fc540f424469e0cd89645cefedd2b1f322035
SHA5126ce90e5f43821efb73ccd6df6d78087e8f69176d64594cbd6a180322a87b2b22585205146f392f405057423f9762c52d2c9387a0b19055298f7e3ace35584674
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize18KB
MD5430ab61a7a9a2c003902a625d90c6a51
SHA147a0f273a921a7b49e74a62f3c8d562b3514d080
SHA256ed40d75bca801ce96e817704309c2fedee5acbda4179ff189eba4f0e3e403a0e
SHA5126349a3bcbae8a458776e27b81540ea74a2d9fbb7d5bcddd7a8ca5f72696a28150f9bda035f8fd0087d4b15aafb65ed316649173fdb2453ad88057d952f481199
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD57de4871a7e91fddf9071d6c282b7d49b
SHA1b88d93c8f5d67b9219fc86ecd1031a819acb4b1e
SHA256ed7b0367d75b8f2a4436dc270d4f831ae6bc69c5f081936809c989c6e00703ad
SHA5123e0e99972eabd1496b00393c81b73bd4d69165008dda223424ecc53d7f01f74a7a15b99078ad826f0f71f8a6fd5fba534b90ccb130558a6fdbe8afe4a05337d4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5e4ba85a4749d211a01893301fed355e7
SHA1e3c10d2d5965269881e6d52e051473c4db534a82
SHA256d25cc580b7d492df70772320bbd44360e945b17ade7be40855e8940cca58112b
SHA512d13ea9cc254e5e66145aff5721a132bddd832f06c44f5ebed96a03365092db2857f72e91d40a40f5d573ebf69840dcf8f1e83bbaae0efbe26366b79cf07a326f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD549b956c97d8c66a68487090db69a4750
SHA18d166517fe62b02746b5704fdabcdc90bae29bd1
SHA25604cdd63372987b7dde2d5f256df390bd9dddf2064879fd2849372293599b3b99
SHA5126abc139d6cb54820db2340e7bc4726afcdff35e59ddd1451f30c119221322e37b2901ce3cb9a5d51d7aba53ac7064ca9eaaaccd79ffecbb1a1e72b3326354325
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\e71cbe29-ec74-46a0-8f55-ddafff37b19a
Filesize982B
MD56ed6d39f0a4bc8bdd3956b111c0aad0b
SHA1439f2f9f38e9f9352498d5081cdab6770e43bebd
SHA2564ea02b6a283d1fbbfc6f97c07f1b1b8a92a64e44055ffde366271ed8fcaa47a9
SHA512f4a6544034361617f0e4953e76df249f39d892d967c6ead5c2b691facdf56774678833eca12a8439c9eb71f37584e4bd7bb7e3839dc4c7d451f7ba55f8cf4363
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\f25af945-05c3-4831-8867-90c24fed4c14
Filesize659B
MD5c3d7ddb0f3e93566d1f72060f291aee8
SHA1980c2261d0bbb879b86162761ba16a1e24d7042b
SHA256383981f875cb14f9382012145db24409b7f97aa976829b5a9f46e4d15fc69d42
SHA512eaed305a50decdf2d21ae524a040e83c9a4b35af2dc1384ae01a4072ddda78358a25627d7348247735fe017efead32c7e78d1d8ebae853223de65837b3101484
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5bee2ed9133b99ea603202ff411c9f850
SHA1eeacef53805d0c6298c6f753c517d3cfebdc0883
SHA256d45d09abbfc3c92ddd645fae6b0fe9e3b160764cfa299f74435e898a89519f4b
SHA512aa39803cef95732966c493b2f24673b7f252dfeaef6381220392a8e9a70b56144ebe9e235d20902302c7fdc66f6e3a1971c1293e6482e4d6c31639a71d2c4458
-
Filesize
12KB
MD5018006a2f7190e332feb7e19aa03cd9e
SHA1e7df121dde912cbf9d04b9b96c23b00d800217dd
SHA256c295460eaac6b599c9dbb70a5db030d37044cf76d280285eb8797be36d88838d
SHA512bf7524f4d306d5bab4f3e715c83d2c1e95124713d88ebcbc7d3027ba41747329e3d2818144f1fa2c932f23d6d0c5e1707cb87212fc45aa6627fe92d24645d6d9
-
Filesize
15KB
MD5a0e8870977466fc74739cdb1b39abf00
SHA11f3b59b75c1b703c05cc7656bfe5f1ae555362dc
SHA256ddb57c2aa6935b52ad47f5698b0c13239a7bd087a584b6df3df6db3b6901d38c
SHA51244c25b05180a94d2b05578e9cfd52594d0faf8c15f271c025389835773c208f573984ca4378429f612ad715c46af514ebe9aa392331c4accdfed97b23e9f490e
-
Filesize
10KB
MD5196902f44660c17f60defee5a2ee99e9
SHA196e911d2476bff552c720040a763da3ab0ee6864
SHA2566aa72978346c54940b806ba43ac6dbdf7cd26dea79419826cbf95929c46a18f3
SHA51240188df9f6c3cbf3502c3eb70f06075fbb208486ad155fb6b4d8b05536b5db35e2e56e89f51866c2ff7c0eed4933b398075eb4e32db485a41210b7187317f584
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize768KB
MD5e95f1cc8337e2b866acb7e70cbb3bb25
SHA1f82357a6f927bcd19a4d0335f39aca574dd2c449
SHA256d63117e973795f0a2cf8f61f98588b69883ce0588c6b023426b46dde049e13b4
SHA512b40096888e5eee589693664a8d8ee8a0bd0c5a9fb5fe004cbe3b3333479bbf47cfc7eca42a607d1f5f0fd1934d04da04de542e9dcb2768776d9c815dd73c9409
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD547839c5056ef7f45e843507def038b0a
SHA12557c6c3b4a344531d13f2648cda4d02b9cf5105
SHA2563fd30262bd81e9dfa53e04687b902e69476d7ca1f50b88772416ed4e15172f84
SHA512392194709d225742168c3540394882b5feb2a1e8edcd196d4993f6925637aab60861c6119439e615fc36f73c41f59483f73891a5c0ef5f0fadec09e7e514d8ac
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e