Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 16:14
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240708-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
d349980d19605cccfb15081f93c9db31
-
SHA1
b9110f209abc6d452f13e955592df37a1e30db24
-
SHA256
ba7b2f6e55a0b6b2aa5c2528e623ce40090c78e3be8d30d4a07f9c8ca483ae94
-
SHA512
a3c8d876d1df6983d53b91e4fe3d0a2164a46cb24c7121f8f50c1e8565093a17b45ef482ffd6cb89eed435cf118e6482debc8c2e7bb610f227c226093184e8bc
-
SSDEEP
49152:JpqV4uD6HKqZp75N0/uDZKxKGphy38i9j/c4:JpqFEfZpNN0EZIp43xNc4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" cd01cbbacf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" cd01cbbacf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" cd01cbbacf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" cd01cbbacf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" cd01cbbacf.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection cd01cbbacf.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7a0dc225a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9d18426fb3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cd01cbbacf.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cd01cbbacf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7a0dc225a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9d18426fb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cd01cbbacf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7a0dc225a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9d18426fb3.exe -
Executes dropped EXE 5 IoCs
pid Process 2832 skotes.exe 2860 7a0dc225a6.exe 1884 9d18426fb3.exe 828 be48561c2e.exe 1924 cd01cbbacf.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 7a0dc225a6.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 9d18426fb3.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine cd01cbbacf.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine file.exe -
Loads dropped DLL 7 IoCs
pid Process 2492 file.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe 2832 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features cd01cbbacf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" cd01cbbacf.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\cd01cbbacf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007707001\\cd01cbbacf.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\7a0dc225a6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007704001\\7a0dc225a6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\9d18426fb3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007705001\\9d18426fb3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\be48561c2e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007706001\\be48561c2e.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019cd5-71.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2492 file.exe 2832 skotes.exe 2860 7a0dc225a6.exe 1884 9d18426fb3.exe 1924 cd01cbbacf.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a0dc225a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d18426fb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd01cbbacf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language be48561c2e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 896 taskkill.exe 1364 taskkill.exe 2132 taskkill.exe 1548 taskkill.exe 1700 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 7a0dc225a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 7a0dc225a6.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 7a0dc225a6.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2492 file.exe 2832 skotes.exe 2860 7a0dc225a6.exe 1884 9d18426fb3.exe 828 be48561c2e.exe 1924 cd01cbbacf.exe 828 be48561c2e.exe 1924 cd01cbbacf.exe 1924 cd01cbbacf.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 1700 taskkill.exe Token: SeDebugPrivilege 896 taskkill.exe Token: SeDebugPrivilege 1364 taskkill.exe Token: SeDebugPrivilege 2132 taskkill.exe Token: SeDebugPrivilege 2992 firefox.exe Token: SeDebugPrivilege 2992 firefox.exe Token: SeDebugPrivilege 1924 cd01cbbacf.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2492 file.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 2992 firefox.exe 2992 firefox.exe 2992 firefox.exe 2992 firefox.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe 2992 firefox.exe 2992 firefox.exe 2992 firefox.exe 828 be48561c2e.exe 828 be48561c2e.exe 828 be48561c2e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2832 2492 file.exe 30 PID 2492 wrote to memory of 2832 2492 file.exe 30 PID 2492 wrote to memory of 2832 2492 file.exe 30 PID 2492 wrote to memory of 2832 2492 file.exe 30 PID 2832 wrote to memory of 2860 2832 skotes.exe 32 PID 2832 wrote to memory of 2860 2832 skotes.exe 32 PID 2832 wrote to memory of 2860 2832 skotes.exe 32 PID 2832 wrote to memory of 2860 2832 skotes.exe 32 PID 2832 wrote to memory of 1884 2832 skotes.exe 33 PID 2832 wrote to memory of 1884 2832 skotes.exe 33 PID 2832 wrote to memory of 1884 2832 skotes.exe 33 PID 2832 wrote to memory of 1884 2832 skotes.exe 33 PID 2832 wrote to memory of 828 2832 skotes.exe 35 PID 2832 wrote to memory of 828 2832 skotes.exe 35 PID 2832 wrote to memory of 828 2832 skotes.exe 35 PID 2832 wrote to memory of 828 2832 skotes.exe 35 PID 828 wrote to memory of 1548 828 be48561c2e.exe 36 PID 828 wrote to memory of 1548 828 be48561c2e.exe 36 PID 828 wrote to memory of 1548 828 be48561c2e.exe 36 PID 828 wrote to memory of 1548 828 be48561c2e.exe 36 PID 828 wrote to memory of 1700 828 be48561c2e.exe 39 PID 828 wrote to memory of 1700 828 be48561c2e.exe 39 PID 828 wrote to memory of 1700 828 be48561c2e.exe 39 PID 828 wrote to memory of 1700 828 be48561c2e.exe 39 PID 828 wrote to memory of 896 828 be48561c2e.exe 41 PID 828 wrote to memory of 896 828 be48561c2e.exe 41 PID 828 wrote to memory of 896 828 be48561c2e.exe 41 PID 828 wrote to memory of 896 828 be48561c2e.exe 41 PID 828 wrote to memory of 1364 828 be48561c2e.exe 43 PID 828 wrote to memory of 1364 828 be48561c2e.exe 43 PID 828 wrote to memory of 1364 828 be48561c2e.exe 43 PID 828 wrote to memory of 1364 828 be48561c2e.exe 43 PID 828 wrote to memory of 2132 828 be48561c2e.exe 45 PID 828 wrote to memory of 2132 828 be48561c2e.exe 45 PID 828 wrote to memory of 2132 828 be48561c2e.exe 45 PID 828 wrote to memory of 2132 828 be48561c2e.exe 45 PID 828 wrote to memory of 1076 828 be48561c2e.exe 47 PID 828 wrote to memory of 1076 828 be48561c2e.exe 47 PID 828 wrote to memory of 1076 828 be48561c2e.exe 47 PID 828 wrote to memory of 1076 828 be48561c2e.exe 47 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 1076 wrote to memory of 2992 1076 firefox.exe 48 PID 2992 wrote to memory of 2668 2992 firefox.exe 49 PID 2992 wrote to memory of 2668 2992 firefox.exe 49 PID 2992 wrote to memory of 2668 2992 firefox.exe 49 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 PID 2992 wrote to memory of 2360 2992 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\1007704001\7a0dc225a6.exe"C:\Users\Admin\AppData\Local\Temp\1007704001\7a0dc225a6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\1007705001\9d18426fb3.exe"C:\Users\Admin\AppData\Local\Temp\1007705001\9d18426fb3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1884
-
-
C:\Users\Admin\AppData\Local\Temp\1007706001\be48561c2e.exe"C:\Users\Admin\AppData\Local\Temp\1007706001\be48561c2e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1364
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.0.801208473\682761440" -parentBuildID 20221007134813 -prefsHandle 1252 -prefMapHandle 1244 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {71763f80-cc73-4129-acf4-5aeaba73d1d0} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 1364 109f2358 gpu6⤵PID:2668
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.1.348010851\1694133353" -parentBuildID 20221007134813 -prefsHandle 1532 -prefMapHandle 1524 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e534115-bb20-4633-911f-df914aae6528} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 1544 43ed258 socket6⤵PID:2360
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.2.2022257029\1737033703" -childID 1 -isForBrowser -prefsHandle 1816 -prefMapHandle 1780 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 648 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0bde547d-c5fa-4059-a13d-35e45cd259a2} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 1120 1095bb58 tab6⤵PID:2940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.3.610894304\1676401720" -childID 2 -isForBrowser -prefsHandle 2656 -prefMapHandle 2652 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 648 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {03253e2f-b3cd-4523-8c07-2d01f8ddc7fa} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 2668 1b41b958 tab6⤵PID:524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.4.1626271797\549132278" -childID 3 -isForBrowser -prefsHandle 3684 -prefMapHandle 3800 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 648 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f34d8366-257b-4458-b25a-39f512a8f7e1} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 3840 1db5e158 tab6⤵PID:2856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.5.1504572905\2042938854" -childID 4 -isForBrowser -prefsHandle 3984 -prefMapHandle 3988 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 648 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {10495cbc-f0e2-4604-919c-49090cef0559} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 3972 1eb7cc58 tab6⤵PID:2488
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2992.6.1321128954\1569211195" -childID 5 -isForBrowser -prefsHandle 4172 -prefMapHandle 4176 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 648 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f88191ca-ecbc-401a-8abb-bcbf836b25eb} 2992 "\\.\pipe\gecko-crash-server-pipe.2992" 4160 2068f458 tab6⤵PID:1524
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007707001\cd01cbbacf.exe"C:\Users\Admin\AppData\Local\Temp\1007707001\cd01cbbacf.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD57a653a00e157e2c4a4e05887892a7ae2
SHA1ffd5c5686d1d8defff71a3fdcca49cab00103386
SHA2569727a3af96a488e96be12496f4a67af1c6ba8538dd20ab2b60260f675014a01e
SHA512113e8c841326cc0b8e1bbcc02c0c1bdd1eec42c4eec7f47cfd58ec0c05bd954ed269e7332be4700895b1a4b5a0456a3ddb856a12d97e07ef8033356face9f967
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD54d52e49c83d62bd81aea70542660d7c1
SHA124d3700da0d738830a5e4960d289f6a7892cada3
SHA256fc7acf18fe77c5a171996445710d544381dbe9765d5c886ba423f890853fd9b2
SHA5126144c9aacbd6fe995fe25d447cf43c74087dcb32d8633807629c380837d7c5b6fabefdb311078939e2562ceda61b8091a1436a3cb37e641553bfa22e6f8447f9
-
Filesize
1.8MB
MD5484a61fde611c70fb8c839df92cf985e
SHA15d9560536a1b329eaa5b36381536f1082c0ff6da
SHA25629782f0ac19c69804afcfbb6186c7729cf956e9f13ea337537c777f532699598
SHA512ca912e4234abe6810e74285aea635a132d30462f6d3894fc64a81ea7e8c23b47d499b450d4cad7c723ffe742db669a4ec1916534d58a0ba6340cbff080e60eb9
-
Filesize
900KB
MD58ac15cf603cc81e0ab0204a91e52bda1
SHA10af6a75dfada4b67958e390ab7f59a8d651dd930
SHA256ae25fcecdb0bb5303793575c8a176bb57e77cede9e437015bf2c9b1334dc8a69
SHA512209253b1d55065eb122f9bda9a93557acb3dbb5ac81f49890c059f1d21258078d999eb303f0f850c7e48e61b0db185f6fd876110fa40ed6200b94144467c835c
-
Filesize
2.7MB
MD55dd4d4d1828c8bca8d339f1e113db959
SHA1e8d1dc9e7bbee871050ac0b90f78fdb179dc36b9
SHA256255f17e80dfcbf94f8d2a1098dee2dd741a6d4560b3ca646a3402017a2c8dba3
SHA512102ab646d1c2fdcd22a3978b72159a741ba0e62d24856dcc1c1369780841fe6af6073c9d364cce58824338dc28878b5d9bdc37d2b2a1355d548ee5f7a8432236
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD51faf5e798d339116ddd62267268d093c
SHA18edd012ec24f756fceed51c2acbd3fdb3babea88
SHA256c6de2e9da498892762288b88fde47bae9ecce8e59272fd91997f1312b200f554
SHA51284c589b0c4031a71ed514d7efabde6c25db300866acc56c6460a22bcad58fe989bb9ca8b2b97c3b220d918db83f5d652c3c7d260dd22d4b63ed9ab60afadf675
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\58a11ae3-9989-4938-8ad0-6a882c415547
Filesize11KB
MD5d0701fc8a628530d4d30fdb0b5a8d59f
SHA15c920db7ed07fe3aab941c3a672d6cffa357cfd4
SHA256c1d726e0d3b3aec697a93509e4891fbe4aa5d8c3f9c8b3e88321696932310bdb
SHA512ef8d3bcc3ac023678886b428513974dd70964d1e261bfaa8f900122dd0e89ac747300c4d555f4fe6e96e22a2c5758be405a8804333bcf147ec91263b8858bf0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\fb28837d-6b3a-4aa4-96f0-ef60b79cdf98
Filesize745B
MD5cbaf829cf34826d372a1f3c5b270b030
SHA1e236d9c51f70e39251e79fa1ee72c6a356d27ecf
SHA2563f6d684d7ff1a76c2b671311e1faed6264525cce147c0f39ec790fcc19a97af5
SHA512316aa52d00579ff2d4bc92d49b0358bd3c5fb9748742ebef80d2d4caaa19034243783d27b9683415e867d527f2a8cba1156ba0228fa0a0ed9b12a3d49052572a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD56bede6f3db1de525affc5c6f4187bcb4
SHA1c0eb7056ff25a6feaebfd6dc06f5f27819cdef92
SHA2566e50af112aa815eee9bf32cbd1dec296be24624780533dbc9972dd350c34d9a4
SHA5122e8bdbdf1ecc358baf6c6a776d0fdd2fec56b020a04fa4c8c2fdaf5898079730a75a1173ce0d8aa8e81ff44452207bf25b4f0e30dd15202f10dee4a04e724802
-
Filesize
7KB
MD55769b71d5158d05767dbe641db773ca0
SHA1e93243eea726968f7e32fd3470742c508364d605
SHA256b55492749b3e33235588724b4f47aa842f71161083bdf116891436f2257e8027
SHA5122f633704351fd4d88b1063d3045155a2512f2185803de335f9d0dbc55d0a4fa5d4e83875d9b6d542568eaa017033dab0ce1b3bbb7273d953d7ae84c0a9d9ea33
-
Filesize
6KB
MD5f43f96becf1cdc43c6c10d9e112c3ec5
SHA1c87a2fe40349a3941a6de6da1f36b892c58d0a99
SHA256bf1b1eac8b2b1325897b25f49985f71f93eeb4c17a6dc6bc510d8ebf64ce9485
SHA5126fd78684e3b8ecb4b6732974c25a69a59950301550547d885152d6a56d9d7a12597d14c92ba83b3f215d3a3f03f5ce2a45d9cc3e153e98d48faa13ae0bcaa768
-
Filesize
6KB
MD5626d1948932b72615517f8d8d93bb91f
SHA1bcdc56761f5019d6429a4ede8f21b94be0f273c5
SHA256675e86ca40569231de23247dc6ecca76315b30288032c5e7a883b238d24c4663
SHA5122a19e0ac0faa52b99208343d80ffc2e276e9fd099f53ab930d23f5688e451e17b6bb9676f73cfd492996ca23919bf0ae097def17a7e83f7446495fef4572f4cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5045920e672947963e9f92c0b81f4a87e
SHA161a4230fb34c7f959557e7b058631310d332dfa7
SHA256d10b3a744bb77711ab11477b73f75f05d08c7647354e71aadc7d7ea673b21e99
SHA5124b03c633fff535bebee1735d6c22a389345aa31c27900dc970d5e807762aea4d47f0abb28229c931913d3b9790404428cb8e9ffb646e645f01094034cdb18118
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5eddd6ec486134bdcccb635554aa22c10
SHA1731c9cacbdd85c2f7945e8c2dc84123bb1b8be46
SHA256f785ebbb63fd343d61e656f5f92018d4c25bed03fe11ddfce7b7c61c9ce7b5e6
SHA51274824f4b64a0bc96f69b3151d3e1e1b19ae11ad516a2e83c4f2adf121949adf944bcc29dbf34e014e4d9e218e8bb83f1a90f8967a50541160fb8987af3f3615f
-
Filesize
1.8MB
MD5d349980d19605cccfb15081f93c9db31
SHA1b9110f209abc6d452f13e955592df37a1e30db24
SHA256ba7b2f6e55a0b6b2aa5c2528e623ce40090c78e3be8d30d4a07f9c8ca483ae94
SHA512a3c8d876d1df6983d53b91e4fe3d0a2164a46cb24c7121f8f50c1e8565093a17b45ef482ffd6cb89eed435cf118e6482debc8c2e7bb610f227c226093184e8bc