Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
J558U_file.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
J558U_file.exe
Resource
win10v2004-20241007-en
General
-
Target
J558U_file.exe
-
Size
1.8MB
-
MD5
9026ca6bc267a2ac0e092e352cb39dfe
-
SHA1
081dbb285587965762103b87f260f1371af58087
-
SHA256
e2b42da09ca84002f6f77f31c1ed5c2d14346aa5984ffe8a494ff1e69c35a68d
-
SHA512
f03a4ff06faa9c32f1ddfa39da15c315bc12edfc04199f48a88c6fb7cc3c74612580668fc51d2303d24a70d11075bff48e148a21c17244adb7435ad12aa91cdf
-
SSDEEP
49152:d+NNooX6+IMF0uqSYgXRVb/LrDGvJpTb:oNNVXBIjgVTLWvJp
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
CLOUDYTNEWS
http://31.177.109.184
-
url_path
/8331a12a495c21b2.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/1744-145-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
8cd5ecf1b5.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8cd5ecf1b5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8cd5ecf1b5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8cd5ecf1b5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8cd5ecf1b5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8cd5ecf1b5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8cd5ecf1b5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exed2394ba2aa.exe8cd5ecf1b5.exeskotes.exeJ558U_file.exeskotes.exe662e0efed3.exee28615e9bd.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d2394ba2aa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8cd5ecf1b5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ J558U_file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 662e0efed3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e28615e9bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5244 chrome.exe 5680 chrome.exe 5652 chrome.exe 5996 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
8cd5ecf1b5.exeskotes.exed2394ba2aa.exeskotes.exee28615e9bd.exeskotes.exeskotes.exeJ558U_file.exe662e0efed3.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8cd5ecf1b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d2394ba2aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e28615e9bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion J558U_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8cd5ecf1b5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion J558U_file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 662e0efed3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e28615e9bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d2394ba2aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 662e0efed3.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
J558U_file.exeskotes.exed2394ba2aa.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation J558U_file.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation d2394ba2aa.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exestealc_main1.exeskotes.exed2394ba2aa.exe662e0efed3.exee28615e9bd.exee62740bb0f.exe8cd5ecf1b5.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 2840 skotes.exe 3496 stealc_main1.exe 956 skotes.exe 1744 d2394ba2aa.exe 4260 662e0efed3.exe 4916 e28615e9bd.exe 2224 e62740bb0f.exe 1496 8cd5ecf1b5.exe 1492 skotes.exe 2284 service123.exe 5748 skotes.exe 5156 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
J558U_file.exeskotes.exee28615e9bd.exeskotes.exed2394ba2aa.exe662e0efed3.exe8cd5ecf1b5.exeskotes.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine J558U_file.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine e28615e9bd.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine d2394ba2aa.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 662e0efed3.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 8cd5ecf1b5.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 2284 service123.exe 5156 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
8cd5ecf1b5.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8cd5ecf1b5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8cd5ecf1b5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8cd5ecf1b5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007729001\\8cd5ecf1b5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\662e0efed3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007726001\\662e0efed3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e28615e9bd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007727001\\e28615e9bd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e62740bb0f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007728001\\e62740bb0f.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0003000000023399-110.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
J558U_file.exeskotes.exeskotes.exed2394ba2aa.exe662e0efed3.exee28615e9bd.exe8cd5ecf1b5.exeskotes.exeskotes.exepid Process 2324 J558U_file.exe 2840 skotes.exe 956 skotes.exe 1744 d2394ba2aa.exe 4260 662e0efed3.exe 4916 e28615e9bd.exe 1496 8cd5ecf1b5.exe 1492 skotes.exe 5748 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
J558U_file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job J558U_file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 4304 3496 WerFault.exe 84 3588 1744 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d2394ba2aa.exeservice123.exeschtasks.exeJ558U_file.exeskotes.exee28615e9bd.exestealc_main1.exee62740bb0f.exetaskkill.exetaskkill.exe8cd5ecf1b5.exe662e0efed3.exetaskkill.exetaskkill.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d2394ba2aa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language J558U_file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e28615e9bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stealc_main1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e62740bb0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cd5ecf1b5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 662e0efed3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exed2394ba2aa.exestealc_main1.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 d2394ba2aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString d2394ba2aa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString stealc_main1.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 stealc_main1.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2472 taskkill.exe 3532 taskkill.exe 4296 taskkill.exe 3164 taskkill.exe 3208 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
J558U_file.exeskotes.exeskotes.exestealc_main1.exed2394ba2aa.exe662e0efed3.exee28615e9bd.exee62740bb0f.exe8cd5ecf1b5.exeskotes.exechrome.exeskotes.exepid Process 2324 J558U_file.exe 2324 J558U_file.exe 2840 skotes.exe 2840 skotes.exe 956 skotes.exe 956 skotes.exe 3496 stealc_main1.exe 3496 stealc_main1.exe 1744 d2394ba2aa.exe 1744 d2394ba2aa.exe 4260 662e0efed3.exe 4260 662e0efed3.exe 4916 e28615e9bd.exe 4916 e28615e9bd.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 1496 8cd5ecf1b5.exe 1496 8cd5ecf1b5.exe 1492 skotes.exe 1492 skotes.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 1496 8cd5ecf1b5.exe 1496 8cd5ecf1b5.exe 1496 8cd5ecf1b5.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5748 skotes.exe 5748 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe8cd5ecf1b5.exechrome.exedescription pid Process Token: SeDebugPrivilege 3208 taskkill.exe Token: SeDebugPrivilege 2472 taskkill.exe Token: SeDebugPrivilege 3532 taskkill.exe Token: SeDebugPrivilege 4296 taskkill.exe Token: SeDebugPrivilege 3164 taskkill.exe Token: SeDebugPrivilege 4772 firefox.exe Token: SeDebugPrivilege 4772 firefox.exe Token: SeDebugPrivilege 1496 8cd5ecf1b5.exe Token: SeShutdownPrivilege 5244 chrome.exe Token: SeCreatePagefilePrivilege 5244 chrome.exe Token: SeShutdownPrivilege 5244 chrome.exe Token: SeCreatePagefilePrivilege 5244 chrome.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
Processes:
J558U_file.exee62740bb0f.exefirefox.exechrome.exepid Process 2324 J558U_file.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 2224 e62740bb0f.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe 5244 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
e62740bb0f.exefirefox.exepid Process 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 2224 e62740bb0f.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 4772 firefox.exe 2224 e62740bb0f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 4772 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
J558U_file.exeskotes.exee62740bb0f.exefirefox.exefirefox.exedescription pid Process procid_target PID 2324 wrote to memory of 2840 2324 J558U_file.exe 83 PID 2324 wrote to memory of 2840 2324 J558U_file.exe 83 PID 2324 wrote to memory of 2840 2324 J558U_file.exe 83 PID 2840 wrote to memory of 3496 2840 skotes.exe 84 PID 2840 wrote to memory of 3496 2840 skotes.exe 84 PID 2840 wrote to memory of 3496 2840 skotes.exe 84 PID 2840 wrote to memory of 1744 2840 skotes.exe 105 PID 2840 wrote to memory of 1744 2840 skotes.exe 105 PID 2840 wrote to memory of 1744 2840 skotes.exe 105 PID 2840 wrote to memory of 4260 2840 skotes.exe 106 PID 2840 wrote to memory of 4260 2840 skotes.exe 106 PID 2840 wrote to memory of 4260 2840 skotes.exe 106 PID 2840 wrote to memory of 4916 2840 skotes.exe 108 PID 2840 wrote to memory of 4916 2840 skotes.exe 108 PID 2840 wrote to memory of 4916 2840 skotes.exe 108 PID 2840 wrote to memory of 2224 2840 skotes.exe 109 PID 2840 wrote to memory of 2224 2840 skotes.exe 109 PID 2840 wrote to memory of 2224 2840 skotes.exe 109 PID 2224 wrote to memory of 3208 2224 e62740bb0f.exe 110 PID 2224 wrote to memory of 3208 2224 e62740bb0f.exe 110 PID 2224 wrote to memory of 3208 2224 e62740bb0f.exe 110 PID 2224 wrote to memory of 2472 2224 e62740bb0f.exe 112 PID 2224 wrote to memory of 2472 2224 e62740bb0f.exe 112 PID 2224 wrote to memory of 2472 2224 e62740bb0f.exe 112 PID 2224 wrote to memory of 3532 2224 e62740bb0f.exe 114 PID 2224 wrote to memory of 3532 2224 e62740bb0f.exe 114 PID 2224 wrote to memory of 3532 2224 e62740bb0f.exe 114 PID 2224 wrote to memory of 4296 2224 e62740bb0f.exe 116 PID 2224 wrote to memory of 4296 2224 e62740bb0f.exe 116 PID 2224 wrote to memory of 4296 2224 e62740bb0f.exe 116 PID 2224 wrote to memory of 3164 2224 e62740bb0f.exe 118 PID 2224 wrote to memory of 3164 2224 e62740bb0f.exe 118 PID 2224 wrote to memory of 3164 2224 e62740bb0f.exe 118 PID 2840 wrote to memory of 1496 2840 skotes.exe 120 PID 2840 wrote to memory of 1496 2840 skotes.exe 120 PID 2840 wrote to memory of 1496 2840 skotes.exe 120 PID 2224 wrote to memory of 3592 2224 e62740bb0f.exe 121 PID 2224 wrote to memory of 3592 2224 e62740bb0f.exe 121 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 3592 wrote to memory of 4772 3592 firefox.exe 122 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 PID 4772 wrote to memory of 1852 4772 firefox.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\J558U_file.exe"C:\Users\Admin\AppData\Local\Temp\J558U_file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\1007698001\stealc_main1.exe"C:\Users\Admin\AppData\Local\Temp\1007698001\stealc_main1.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3496 -s 12884⤵
- Program crash
PID:4304
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007721001\d2394ba2aa.exe"C:\Users\Admin\AppData\Local\Temp\1007721001\d2394ba2aa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb5667cc40,0x7ffb5667cc4c,0x7ffb5667cc585⤵PID:5260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2076,i,9545105833886796393,17095615021789851204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2072 /prefetch:25⤵PID:5432
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,9545105833886796393,17095615021789851204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:35⤵PID:5468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2160,i,9545105833886796393,17095615021789851204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2588 /prefetch:85⤵PID:5492
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,9545105833886796393,17095615021789851204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:5680
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3176,i,9545105833886796393,17095615021789851204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3212 /prefetch:15⤵
- Uses browser remote debugging
PID:5652
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3584,i,9545105833886796393,17095615021789851204,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4456 /prefetch:15⤵
- Uses browser remote debugging
PID:5996
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5160
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 12964⤵
- Program crash
PID:3588
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007726001\662e0efed3.exe"C:\Users\Admin\AppData\Local\Temp\1007726001\662e0efed3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\1007727001\e28615e9bd.exe"C:\Users\Admin\AppData\Local\Temp\1007727001\e28615e9bd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Users\Admin\AppData\Local\Temp\1007728001\e62740bb0f.exe"C:\Users\Admin\AppData\Local\Temp\1007728001\e62740bb0f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1976 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {39b20fc0-e08a-41a3-b8c4-387d378fb10c} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" gpu6⤵PID:1852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2448 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e0a866e4-b47e-433c-b7dc-dbbefd2644c7} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" socket6⤵PID:3524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1424 -childID 1 -isForBrowser -prefsHandle 3128 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87b4f73c-e28b-4b6f-9431-fbe2eba438cc} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" tab6⤵PID:3616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4056 -childID 2 -isForBrowser -prefsHandle 4048 -prefMapHandle 4044 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {62556797-9d24-47dd-9328-8ae923275ca0} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" tab6⤵PID:1840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4868 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4856 -prefMapHandle 4848 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d784f305-30f6-4c63-8ecd-a5c2cb2f51cc} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" utility6⤵
- Checks processor information in registry
PID:3848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5180 -childID 3 -isForBrowser -prefsHandle 5108 -prefMapHandle 5112 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {61585c05-28eb-4670-9697-b60a27200287} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" tab6⤵PID:5912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5392 -childID 4 -isForBrowser -prefsHandle 5308 -prefMapHandle 5312 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3211aa61-e1bc-4d47-8e3f-6f2f45848090} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" tab6⤵PID:5928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5648 -childID 5 -isForBrowser -prefsHandle 5292 -prefMapHandle 5284 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b3cd8a0-acd2-48bc-bc8c-49d1cf5c9d79} 4772 "\\.\pipe\gecko-crash-server-pipe.4772" tab6⤵PID:6008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007729001\8cd5ecf1b5.exe"C:\Users\Admin\AppData\Local\Temp\1007729001\8cd5ecf1b5.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3496 -ip 34961⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1744 -ip 17441⤵PID:5196
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5748
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5156
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5fe4d22b379c1c53c848c794c0df7a306
SHA1e640db31401e4fdf51dfa7779cc6769e2ea5e59b
SHA256890050ed5d18de93643ae3d08ddf474104299a8d641748866b98f5f20ba54826
SHA51218bfd79f065ab0c50739b145871dbc6cba568fb3d18daed6ee248eb1557c1f37939d66e9b0adeb5d825d64238a757b3fbc0b69bd529432eefaa46bffa625d30c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD573d1a7e51c906e6fbaddb41e645a0a9d
SHA17de03267e52f1817b2b7fe90d34b65d753c2d14c
SHA2567ff49bf324395ddd11bd34682953d720c6d7a81cd60f6dcda02e70cd1c7a1c7b
SHA512cc51d96e6049abe03cf26f8e396e6a22bed989cca80a8ff97124f813092306116fbf5bd1d9acb6c77146a1e1d252426c9c1a5e888c3fb51a5557cf50e673f9c9
-
Filesize
239KB
MD5da5c79183dabf3510e9c6d76f7c5c087
SHA1b06a732e61d91b4e2ddc0a288f7472f1c7952271
SHA256093f37a701ed0a89cb89e00cf665f26760de3a532ef97ecd5d75ce51223f932f
SHA512c3fef14434ddbbcf14a4e551257376ae0a57884662f22cad24a009569c8e218839423a52d9715307f57565614699f8d66bc524c0f2ce7930a9b4bff9f12ea0ec
-
Filesize
4.2MB
MD5f90374d1e2df332bd4f9e86c9ae614a0
SHA131a9cc771605166f62d58badad661d2d727ea218
SHA256f9bdb5c752cc0ed00c82cfd43688b694a98cd593e583d31809b625e69b6be007
SHA512d6e2201ede8cf552d2e7c47630ee09f2cb316e0d0511a60a66ae29c19b76304367618053cfe41d647c6991557789fe34e3cfd7168908ed22fe261da80d66f014
-
Filesize
1.8MB
MD5d428ba15ff307879562142d3b642619b
SHA108b51350fe8cf5acf85a1716cbde1a607b8b6ca0
SHA25623b3e65432828bc9913c5a1407a726a21ea9c8e4ca69bba65fc554d8475542f8
SHA51231b1d27b326f7ecf9f45fd57a1cee66e443c4d4cc5294fda201bf8d6062c1865e82d2096b83c33cc9d85ecb75fb617daf658cfc128ce1ea46d9934ff382f9ffc
-
Filesize
1.7MB
MD50c50a08dffa73cfbb9ee5ba4382bdefc
SHA1b21d45218d280416859c21b9c628315d6d71690f
SHA256ea7617b4a5571a89a06ef9bb195dc92a178ea4e0a6a514030eb288f54d26f0a3
SHA512529275d8e96270c711ecee981bb07a3e70eab1a01e3550898449cc9cf2da57b0e823d36fcbfca92f006ebd2b47dd1e9d7dbf2367baf14e010f179e521eeabeea
-
Filesize
901KB
MD55bdda578b122fe3decd3583123e91410
SHA1204c22df2afb0b5c4d518b5a1a5908fc357c8b68
SHA256f1062a92a8b4bcf35af6f22831c36b50b872e6faf3024cd956a5bb7a18846631
SHA512ce9ff05b0dd13e4560373eec092c864356c8ab38e2b73e8d668f8b814958b461439336c7cd3b765dca64183eab7eeadf5c4ec4a61fb7f6fe628723387109832b
-
Filesize
2.7MB
MD54fc28f8386b849a5633c3b4f97decd24
SHA12f68e0e548d77a1fc5b871ca56246ecf7810799c
SHA2565e33b2113f70189d082a8c87ae822718976c90a84e3a29d55c7acf8f940797f5
SHA5126c66eddc75a4acab38093fccb11f22572c0875ca8e1c182ae67e6628460e2302784165b2173d4593e9a1b9c6546cc0035e8798d218b90f338b94d54ed51d70ad
-
Filesize
1.8MB
MD59026ca6bc267a2ac0e092e352cb39dfe
SHA1081dbb285587965762103b87f260f1371af58087
SHA256e2b42da09ca84002f6f77f31c1ed5c2d14346aa5984ffe8a494ff1e69c35a68d
SHA512f03a4ff06faa9c32f1ddfa39da15c315bc12edfc04199f48a88c6fb7cc3c74612580668fc51d2303d24a70d11075bff48e148a21c17244adb7435ad12aa91cdf
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD51c2fc076d492ea8ecd2f649ea34e2d0c
SHA126a0324873223cd71cdec82e50df2f253441d15d
SHA256028f2b12fe6d2f217ff6ffc325b0c5405c657a80c76992dbdc26461f4509f80d
SHA51297494d6ee45d43027af25dc326ef8c3d673152564d4c1afaf4deae41dd5a18f8ebe813fc2acb2e9e8daf3705e1f6ecfb54ff194906fbca3bda5f545149b22bc5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize7KB
MD5b923949586cf63eb27d0f08bea779d79
SHA1759fef60eeb8365b48ae45c792b94411d4eb3914
SHA256ef080f4970656eaa08ad30bca008977329c37004e9c985b271a4c0be4ae3ebe2
SHA512f2ecf648bf444f9a34e628ba39d3a71336297c5a11d4902734cfbb6951dc74359803be540d5db26f6e5429fb9525bafdd1b116f0da99a18f65363664fe63efe1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD50dc8fa2647152fe5e27e4741a1d27ff2
SHA1ff46a50fe400dd5f35da9e91523b8ead94290d1f
SHA2564edeedfd743a7323f02dc652f74ac1f7af9b99a20a042d61115173d318948198
SHA5120c542e94e143fb56eddc3365273382729722c9c0bda971733c0f7399755d7c1f8d580007dc0240cd2149386c2848972611b8b1b385c920345d98e58c53192a1d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5eb954bf311fc564d73ec60216036a961
SHA11c04e46d16cbb3dd6db529ba0d31027a9d34044d
SHA2563f9d2e5e22cdb68f0c4ed9e6417e7bc88dcabcc71cf1327fbcea5d920e63caf0
SHA5123a339a83987f488baae80034a4253501b225b1aba6e83365f6aabb554712b5b5fc04af80556963b491dd6841984880b2308cd539cc53104ec1ec29b0741b6fc2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b6fc170bcabd8f2ba60a2d49899c8e62
SHA1009146c81aaba2622dcbc16cb2cfbba891f9402a
SHA256b86cc4b2cb7467157a6545cee6daf9289b4ca58f2c525326f85e51e07e579d81
SHA512a5298b3ea2b8c58fbb997cad4955627d3b6f09dc4593343dd55c3ec63d376242ef09d03fb04e2f25d436bcef678711107b1534c4a544997b336035f7ed0298f5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fff0f95499aa77746e4bc8a5d25baa35
SHA10ca1459624ffc0c2299ef425064613038f7efd2d
SHA256d87079fdafe8b0e3d94b8faf773a5dc5a8b524a5ec881c9801f53310da0012d5
SHA512c7dc767137c6f0668fa1ce04ad465275246ceb90a06132360ae1e9abae93651433bdc5d7686d52f146c5c89724ab74f26df30e241ffdafeeaf499345b57b68e6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5e48cf1f1d8cd83d81ceff6e01255966c
SHA166e97fb2159ffaffcdb405be795fc6d3faf4fc7d
SHA256d110cdc781439d02f75a32bb3e449cbdef4d7c718668adb31e450fd88c1b30dd
SHA5122c084f3b3b7d07fb4e142bd20e275c4b67d939e45ab006e6ca6d1cf265200bda3817fb98813db2cab345bd3b04acdbb34e2ae3ef70605c5d1e18feca8c48d8ef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fd551d02be318b2277cad66fde06b2ef
SHA1ac115760190de7724e07360dbb6db71b0ae8de88
SHA256d91dd2fed3b21bc057b6fb6065306cdde2b7d52271fece8b403a89d0c77a5d89
SHA512b746191dba7525718ec8d1e5d21ff50645417d966523820c16d1e438336287c4d2f2a94dbebf848a19209c0e8cb88dd74429c754f28380201ed9e68d5f566866
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\13b90a83-af0b-4f67-b2ae-916730eff09e
Filesize26KB
MD5d56f3a1a205431b3baa42c27871eff5c
SHA11ee3dba37f36e836974a36713273c3f9ad75a022
SHA2564094e009488b1fe7d1509d68543039fc437296ee7b9ec831df7401c69b36d4ee
SHA5122fdcd87feee53bb2d0f6258af116a8d9a1cbcaf660d465227dc23fe8bab02272b18637b80b40a6ffa3946fdd165935c30b28c711b980d7bb8ffb16c10ccca186
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\655b0243-cc0c-4b23-bd01-7902d10b34ac
Filesize671B
MD5caec2a06aa6ab587a789505514e449e1
SHA1392df43cee4250f69f7183018d8ac670d59da60d
SHA256be8ed5f1dfc910eda2ba18b6cdafd91221e7792b5aada5ae42543c7327f348b0
SHA5123712f38cfb9124896f6db8f9570a305e9a10323c5430f34c470cc48108b968b9c5f52d0673d54dd1cbf93187ae4643ca83544270f36db512642c23fa81238a0d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\8d42fc4f-1a73-4839-b285-e0f0236cb492
Filesize982B
MD5ad7f78f32dfa3808e554a50e0b441946
SHA1928f6dd7f614bc6ece3941f6e0298d7ff872ab26
SHA25642f6ef8d2aaa9bda291924b4b076614ad058aeead11b7680f7778ce68c87f663
SHA51229f1599506575a17394737a8478b9415f1716a7980ec9770894afc3d8cdc1361f6b18ab36c66f6b9f09255507d275d5bda325454b6813025ca2c71efeab2f0a0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD529e451bab7d21db91080305b6da6f3e1
SHA13b100902f19b5e27e99b3a2ee055ce189e06098b
SHA25698d1e9b3b3af6eaa35e76452201f2aa92c2c00b73e6f1b8e22fe2899bed1adc2
SHA51290dff4c4e24cb676652f7bba04917f42d4d326924b0eec3569e3e09ba7d6b939a5a5a43fbcf18c5d56f2225caaba0b128d0ccf119351b8b4f6e319b396238c37
-
Filesize
10KB
MD59d37950bd77e0ae0f17977af56d05edc
SHA1ce89a0939694c8ca55570d2700c5f00e5f3ea3d4
SHA256b3493624a41d68b4aa8f47c51c97253165de01f220c730aeebb7e907cefca842
SHA51237ed48c90b4a4054e667253eb795a6228bf48af66ddb8706b759e0b64437c801a08ab50a93c4fec361afbc00f0051400dc29f8e17f22b6403c7097d7807e7ef5
-
Filesize
10KB
MD5c4f26973d538b631ced555566bdfcad2
SHA1307fd399a14d142e29ce2fcdbe18f8eac6d63eff
SHA2562a3400b2a9dfceb2c60e3617d7a93ca8117f3d84698a410e9630e81c10c02873
SHA51211245330e5e5368261f17a7971a22719003d3a82db252d7df064f869919a1b06e349adac7565374a5a36caaffd6a2c4dc3e1d513df3e906cb2e7e65003890e8a
-
Filesize
15KB
MD5d7b7dbdad6e9878a21421cbc2929f88b
SHA10bffb5ef2f6faf1d8315cdd736bac57bb6a4309b
SHA2566bede16cf5ea0bd267383e1ffdb26d5b3d1472ab6e769cfb9ac98b2f30f4bc87
SHA512deba458277e0d6ecdc1420b713854e9c1ab831bcee8cc0291454519ea062558073f0739a920038150d715ec2919a30dee04e3c3a0d40cf45abcab6f4d67e1d65
-
Filesize
15KB
MD5e09203d25159218e01e7ba92f068fee2
SHA1a35d62249cbeb9edad3bbb37095901d5275ee5d7
SHA25662a1d194299652e5394739aea3d6a18635fd8b2fdfef45c1f8457b28f3f22461
SHA512909a732d6379763b62ef11e0a11d3a5ce45b70c14c1682e04e83d371e212a1c3a109ae8a70b857757d5b4c99c1b757e8aae27b230bc1a3f3912ba6b2363c37fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.7MB
MD546b90c8886f470133a527bc9ca32b753
SHA1b1700e03d4fd52626429fd7592e07afcb93a610a
SHA2560189018d68f00b411cdeeac8c80db71ebcd993c7019109a035abe036bf6a0b31
SHA512065bd0e471452a77a3acad2d7d4dd21b963fc0ea3d5d285b064e2af729bfabeb2c13bcda171b15dcb1d5ce9c847f14b5823625d61f8b099a8e3b2136fb219ae6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e