Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe
Resource
win7-20240903-en
General
-
Target
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe
-
Size
1.8MB
-
MD5
73897c497394d9f83b016e6377594c5d
-
SHA1
0243a0aa886487a7e9911aaf1ed5ddb28d983b71
-
SHA256
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa
-
SHA512
e809ebb44765c671c703a61bb28e20f0383c8405a543b94ad88778e5c14682d57c5ffe866e690032b3b85cc500c4270be8452c5ac4a7b8ecca90440b9d4a736e
-
SSDEEP
24576:VdnKzvhEbF6tPhl1QLNquQR+hxt4Hpqv8EWFz47ev/1JVWcvtYOwbHKpOBJ9pQQr:v+yF65hl1Mx+q8EWh1J/WbEOLgQnun
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3060-466-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
d44de8622e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection d44de8622e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" d44de8622e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" d44de8622e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" d44de8622e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" d44de8622e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" d44de8622e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exe8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exefd6bbbf179.exeaa08886d1c.exe45a20686a5.exed44de8622e.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd6bbbf179.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa08886d1c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45a20686a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d44de8622e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5808 chrome.exe 3608 chrome.exe 4664 chrome.exe 5164 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exe45a20686a5.exeaa08886d1c.exed44de8622e.exeskotes.exeskotes.exefd6bbbf179.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45a20686a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa08886d1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45a20686a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d44de8622e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa08886d1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd6bbbf179.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd6bbbf179.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d44de8622e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exefd6bbbf179.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation fd6bbbf179.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exefd6bbbf179.exeaa08886d1c.exe45a20686a5.exe4d4bfa423a.exed44de8622e.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 1456 skotes.exe 3060 fd6bbbf179.exe 2720 aa08886d1c.exe 1536 45a20686a5.exe 2028 4d4bfa423a.exe 3548 d44de8622e.exe 5388 skotes.exe 6072 service123.exe 5132 skotes.exe 592 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
aa08886d1c.exe45a20686a5.exed44de8622e.exeskotes.exeskotes.exe8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exefd6bbbf179.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine aa08886d1c.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 45a20686a5.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine d44de8622e.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine fd6bbbf179.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 6072 service123.exe 592 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
d44de8622e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features d44de8622e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" d44de8622e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4d4bfa423a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007813001\\4d4bfa423a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d44de8622e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007814001\\d44de8622e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aa08886d1c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007811001\\aa08886d1c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\45a20686a5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007812001\\45a20686a5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007813001\4d4bfa423a.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exefd6bbbf179.exeaa08886d1c.exe45a20686a5.exed44de8622e.exeskotes.exeskotes.exepid process 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe 1456 skotes.exe 3060 fd6bbbf179.exe 2720 aa08886d1c.exe 1536 45a20686a5.exe 3548 d44de8622e.exe 5388 skotes.exe 5132 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exedescription ioc process File created C:\Windows\Tasks\skotes.job 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4828 3060 WerFault.exe fd6bbbf179.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4d4bfa423a.exetaskkill.exeschtasks.exeskotes.exe45a20686a5.exed44de8622e.exetaskkill.exetaskkill.exeservice123.exefd6bbbf179.exetaskkill.exetaskkill.exe8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeaa08886d1c.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d4bfa423a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45a20686a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d44de8622e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd6bbbf179.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa08886d1c.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exefd6bbbf179.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 fd6bbbf179.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString fd6bbbf179.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1584 taskkill.exe 1948 taskkill.exe 4028 taskkill.exe 5028 taskkill.exe 3556 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exefd6bbbf179.exeaa08886d1c.exe45a20686a5.exe4d4bfa423a.exed44de8622e.exeskotes.exechrome.exeskotes.exepid process 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe 1456 skotes.exe 1456 skotes.exe 3060 fd6bbbf179.exe 3060 fd6bbbf179.exe 2720 aa08886d1c.exe 2720 aa08886d1c.exe 1536 45a20686a5.exe 1536 45a20686a5.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 3548 d44de8622e.exe 3548 d44de8622e.exe 3548 d44de8622e.exe 3548 d44de8622e.exe 3548 d44de8622e.exe 5388 skotes.exe 5388 skotes.exe 5808 chrome.exe 5808 chrome.exe 5132 skotes.exe 5132 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exed44de8622e.exechrome.exedescription pid process Token: SeDebugPrivilege 1584 taskkill.exe Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 4028 taskkill.exe Token: SeDebugPrivilege 5028 taskkill.exe Token: SeDebugPrivilege 3556 taskkill.exe Token: SeDebugPrivilege 2032 firefox.exe Token: SeDebugPrivilege 2032 firefox.exe Token: SeDebugPrivilege 3548 d44de8622e.exe Token: SeShutdownPrivilege 5808 chrome.exe Token: SeCreatePagefilePrivilege 5808 chrome.exe Token: SeShutdownPrivilege 5808 chrome.exe Token: SeCreatePagefilePrivilege 5808 chrome.exe Token: SeDebugPrivilege 2032 firefox.exe Token: SeDebugPrivilege 2032 firefox.exe Token: SeDebugPrivilege 2032 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe4d4bfa423a.exefirefox.exechrome.exepid process 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe 5808 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
4d4bfa423a.exefirefox.exepid process 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2032 firefox.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe 2028 4d4bfa423a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2032 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exeskotes.exe4d4bfa423a.exefirefox.exefirefox.exedescription pid process target process PID 2612 wrote to memory of 1456 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe skotes.exe PID 2612 wrote to memory of 1456 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe skotes.exe PID 2612 wrote to memory of 1456 2612 8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe skotes.exe PID 1456 wrote to memory of 3060 1456 skotes.exe fd6bbbf179.exe PID 1456 wrote to memory of 3060 1456 skotes.exe fd6bbbf179.exe PID 1456 wrote to memory of 3060 1456 skotes.exe fd6bbbf179.exe PID 1456 wrote to memory of 2720 1456 skotes.exe aa08886d1c.exe PID 1456 wrote to memory of 2720 1456 skotes.exe aa08886d1c.exe PID 1456 wrote to memory of 2720 1456 skotes.exe aa08886d1c.exe PID 1456 wrote to memory of 1536 1456 skotes.exe 45a20686a5.exe PID 1456 wrote to memory of 1536 1456 skotes.exe 45a20686a5.exe PID 1456 wrote to memory of 1536 1456 skotes.exe 45a20686a5.exe PID 1456 wrote to memory of 2028 1456 skotes.exe 4d4bfa423a.exe PID 1456 wrote to memory of 2028 1456 skotes.exe 4d4bfa423a.exe PID 1456 wrote to memory of 2028 1456 skotes.exe 4d4bfa423a.exe PID 2028 wrote to memory of 1584 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 1584 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 1584 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 1948 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 1948 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 1948 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 4028 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 4028 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 4028 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 5028 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 5028 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 5028 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 3556 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 3556 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 3556 2028 4d4bfa423a.exe taskkill.exe PID 2028 wrote to memory of 1952 2028 4d4bfa423a.exe firefox.exe PID 2028 wrote to memory of 1952 2028 4d4bfa423a.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 1952 wrote to memory of 2032 1952 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe PID 2032 wrote to memory of 3024 2032 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe"C:\Users\Admin\AppData\Local\Temp\8ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\1007810001\fd6bbbf179.exe"C:\Users\Admin\AppData\Local\Temp\1007810001\fd6bbbf179.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5808 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa302dcc40,0x7ffa302dcc4c,0x7ffa302dcc585⤵PID:5836
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,3282920135948499803,16536453735444989584,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:25⤵PID:6060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,3282920135948499803,16536453735444989584,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2176 /prefetch:35⤵PID:6080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,3282920135948499803,16536453735444989584,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2496 /prefetch:85⤵PID:4948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,3282920135948499803,16536453735444989584,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:4664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,3282920135948499803,16536453735444989584,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,3282920135948499803,16536453735444989584,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4520 /prefetch:15⤵
- Uses browser remote debugging
PID:5164
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6072
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 18524⤵
- Program crash
PID:4828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007811001\aa08886d1c.exe"C:\Users\Admin\AppData\Local\Temp\1007811001\aa08886d1c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\1007812001\45a20686a5.exe"C:\Users\Admin\AppData\Local\Temp\1007812001\45a20686a5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\1007813001\4d4bfa423a.exe"C:\Users\Admin\AppData\Local\Temp\1007813001\4d4bfa423a.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e163a67-9c2d-44df-850c-565eac2ebd74} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" gpu6⤵PID:3024
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e57e3ab7-241c-41ad-9f2e-06e500a06f50} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" socket6⤵PID:1004
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2968 -childID 1 -isForBrowser -prefsHandle 3328 -prefMapHandle 3440 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72b3f819-af18-4b2c-85dc-74744308717c} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" tab6⤵PID:4428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4000 -childID 2 -isForBrowser -prefsHandle 3944 -prefMapHandle 3952 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {50a4a80a-037a-47a8-bf17-2ca42f5fa315} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" tab6⤵PID:4612
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4784 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4836 -prefMapHandle 4812 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4eaaa560-5fc2-455c-bc98-febef513e7ba} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" utility6⤵
- Checks processor information in registry
PID:5296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4364 -childID 3 -isForBrowser -prefsHandle 5320 -prefMapHandle 5316 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a3f3781-eb9f-470b-8b5c-7392be73d1eb} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" tab6⤵PID:5756
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4840 -childID 4 -isForBrowser -prefsHandle 5456 -prefMapHandle 5460 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {da69a235-5cb6-4313-a912-21ec61bc415f} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" tab6⤵PID:5772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5260 -childID 5 -isForBrowser -prefsHandle 5240 -prefMapHandle 5272 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 1160 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7a092444-b9d9-456c-a10c-4bae6c026fc8} 2032 "\\.\pipe\gecko-crash-server-pipe.2032" tab6⤵PID:5800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007814001\d44de8622e.exe"C:\Users\Admin\AppData\Local\Temp\1007814001\d44de8622e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3548
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5388
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:456
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3060 -ip 30601⤵PID:5136
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5132
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:592
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD57c564e95857cff0920100bf07e44a60a
SHA166865d07aa05750c3f0ddcce10a37e3b6ae41f69
SHA256ba4cb8b5e919d1e45b2dbdf080bf47adc19f114139df8d6f04cc9dca62153230
SHA5124eea7308da8e5040977b2fc615e992aedf93c21190aeeed8d2cc07367a202b94c5af9fca55d8012b60cb12886d1bf7d07060c86991e31c39fc412e71effde43c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\g9per00b.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD508a01db9d388632e874a2d9df090b5b2
SHA114461acb0b87e0e6630783496b1d393a109159f8
SHA256bd7aed9755e7f7899b73e41e3f6ba74afe4cb14389d5603bb2a670717092f1be
SHA512f79151ed4e07c9b6feebcb1053a5344c2bbfbf8d131fd5d09f95cfa80235ff2760ce9befc228a9dec9998e776033d19d1cb4ab6355f8c70de4c1346f87d44f51
-
Filesize
4.2MB
MD5389910a7e7b0be062240be06d7ce5d31
SHA16c7f61dd43e11c3b5ee5bd21914ae5a9875adc7f
SHA256f9fe7307aac94b1dcd354cb199243dad83dcb5c3cdf4b599e643e8321b916ef1
SHA512231c854c70859b52f000f0a374d63077dfb00ee3af1ceabc76e53ffb289008d4a94df7dd0c6ab7482ca350ee6ee8f9ca79b20881534295a6ab7a0bfe545d66a0
-
Filesize
1.7MB
MD5a387bd34917033174622ded6a3bfd781
SHA14a83a6df052d479a8b9bfaf18c05e8bd3ad46989
SHA256c53f5b4eb89cb540a70a6719be2bdbd18719c0acbb1363c9603d43d83a18dc9c
SHA51299ba3da9056c4ae82acfd3ae9add555d00f1178e0c671cfb6931d872cbbfe32c27b788a90fb2ddc6dc1a1e35afedb67e45ec782fe5bc9f13b361e7a07e308ce4
-
Filesize
1.7MB
MD50157dd2ed057c6d60f978e502fbee0d8
SHA1c55dfd3bf8e99c7925d83ac14e96b7eccec2383c
SHA256f8806791549705d6be98d2b40314fd54bac69524369e3ff429c9d18b0acebd53
SHA5128af621f9303824192ef1c2a8f3f94a5dc4eb4436ed14f0af970051928dba42e3ae17baea629b7889be2479dcb6ed265598ca4f73d47a59a449495427bfe327af
-
Filesize
901KB
MD54d01319f036290a237344700140e9dcb
SHA18a993be2e7474092b7565cbc11a5436d4a707d57
SHA256f2d69993ab991c86827b9e87a737c9950912398dc17804147ab71aa5ab92568f
SHA512bcea48fb76c13f286b44ca585b637602684cec479d2cb519e036ede16b9fadff518d2e3b37a0f1492e387f1bdbbd06895d16f3733fa492221a3a0b8221eb6030
-
Filesize
2.7MB
MD561fe9ca456c2881848651738ab9f7148
SHA1589e60d69861bcc653b86d76fcf2e56ccc808521
SHA256b19e58f2f509590e8cb1f79218b9c0893130a929fcc21737b48f7238380c9c6d
SHA512530bfa627ac2033ea6845031b1860e3d575ff8054a3406d3c41e12f75ccea510849a34681f3217d9ec72cf2b3fe847acba3e431f0885507967a1539918a6fa5f
-
Filesize
1.8MB
MD573897c497394d9f83b016e6377594c5d
SHA10243a0aa886487a7e9911aaf1ed5ddb28d983b71
SHA2568ef6cd5928d602f0011ba38eaada3c2a5a8e26930c9064400f81e7e182bc7aaa
SHA512e809ebb44765c671c703a61bb28e20f0383c8405a543b94ad88778e5c14682d57c5ffe866e690032b3b85cc500c4270be8452c5ac4a7b8ecca90440b9d4a736e
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize6KB
MD57a5df4de73a662f7319b88c66eebf4ff
SHA16c8a809e00ab102b9b205b95be1cb4fc2f346566
SHA256ec6d4668693f7b5239a779a959f447a9956bc8b7b49554d469354a597f7a364f
SHA512663d0bbe58056be54a398b12c10ef953a3d3d02f4df37164c4d2e17128ee2bb9b8b0b4ed6cf050cf0a4e77b044164b2b4eed2500347afc9f3da5c66a6a550221
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize18KB
MD568e2c21744f63d1e38eed9e8f5c0849c
SHA1337425a8c2b394c81103ae37ebfd9a3e8196dc8a
SHA2565d4bd0189cd926d64e528d9c7d144cb060d9a590a2d298ffe019425ed18a1147
SHA512710373a18195942869d70ba64f54c7c54d573e247d70cf53895617ac6209ea53ae68b1f7b45fd3e1bdfcc8e9f9fedd8191751733b23b24412b63ec718001e467
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\AlternateServices.bin
Filesize10KB
MD56b1383e2e94eea6db7a0daf1e2ae454f
SHA1945b16b28aaf9f07ab1eff352897ff05a9d634a6
SHA256fe9f705606ee3eac1d6b6fc81a4b02c2ced423a402e2820e1205be221c6a80c9
SHA512a0701879f76c7dc910a0053218910c815c3228992766ceeda9c0158bab2cccddfccdbd838fc9be5f05cc332ad891d5511a5a09a24c3de7ce9bd95d1e968d4a88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5c22ca919064268871c7cbeb6f055ea86
SHA1a447b9e87ea56421f7f920b88a903248e8684886
SHA2563bbdd99a78a5b9c52478248a325ea9c7ff8f317288cf1f2e6905796d820a2d02
SHA51200c276f02014e59253944c8a61480d3d2cd937fbf55316e9993b4baeecdb485de8a5ac137a0e355258172f769d2d0b93ec72ca989ff7bd1daab15392ffdfceda
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD512786abc15d5be8337337d3c9b863d41
SHA12958078f9673bb902e67ccb888c0dbe13f3a0377
SHA256f9c7e337893b46c35c403f19c628727acaea9a2d8106ab1b8f8ab75b29c59c41
SHA512a110cd67659739d7e916fecd53633009fc23e0e2c90543e4f00a8dfe8b6a75965c0630decfdf5c592aaa3600eecea6fd0b52e9468360612aabf4953aaa856f54
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD515e7fb06bb9b270e62158b518e36618c
SHA13e374c0a83f0815231771a021780e3691dad5d0f
SHA256f3af10f42e73a79881a373413ec5c473111074396c7679acc022a528c74853e3
SHA512f968171b0ca57a1816b7e0f982cd748e9d694fd62b233fe10d09d60d43f01eab3a0afb77d9d7decc9874a89571f86657a6175270699bf05db0a92da63cc08a01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5bf90891fd444f703e05ef9f820c54f90
SHA17c4a6f90f9d147dc98bf26c232c47b2b0983da07
SHA256abe1c5eb4966cd46ea8e69e639f0b35525b180f29a82e952c8464e2a666483a0
SHA512f8943ea5a32c92eaa360bfc53589bba33d02e13c8e5d12d4a22039438012a6eb08d6e3842f6f5e3b84b7100e6c86d2190d9a2fcc57134a66c569456e409d3b3a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\765da16f-cdfb-44ed-b0ba-ca8f4cf307d4
Filesize982B
MD548910288de7b506455ed26f4b098315d
SHA17ccebb2511ae37a5a4cbf16383f27d5d0468d04a
SHA2565b53a1a092e09f4babd0bb486c64f31f808c9524dd2e565d5b3d717f910ea2f9
SHA512d6039906bcfe7a969f698ea755b56bd4f161b95bf3bc2833ec4519224b9c26f88033a2f9bef7ae3132cf3fea91cf09ee7b1e1c0de3c7cfbfc40d63e4ea8a21f4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\datareporting\glean\pending_pings\eb73015e-32d7-448c-94f7-59a78faf6a27
Filesize659B
MD5fac97dfb1ebdc52085609d91d65ef840
SHA12bdf6ca847da72eed1d0319b68cdec696d8a5af6
SHA256e65aeec4d9c83708db405e873bfc237a93d5dd0d34a140370a1cb6fd79aa2bf1
SHA512e5bc3120ae97c683c4586e09f7a4ebc27a142e55e8dd9d78dcc877522c61339bf3c978d5fb42625c13a05cf967e2ddee409466942b1b979efe7e81a7a8ee30cd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\g9per00b.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD54cdd2c0c87151610c8068a3fe5a729b5
SHA16cb31aaab5434a3866e80e5ac5267d4ccbd3fb42
SHA2564fe03fb6eb06ca59724fb714229ab656d1ba74f178eacac2066bd402ead79b90
SHA512e9d6bdbd3324185ff640a21d05541f5e6e50d0819244b81035230ffc54beefab68ca5b25d8422848ebafab2f737aeb3b1e082f613bcf1d1af47fe5f799d6474f
-
Filesize
15KB
MD50bb746812e17f94fa7e7ca5054467d9c
SHA1a200fdd7d7caa52c001dea08777e7e253e88399e
SHA256ff6a1803138ac0e57da3f6bc9ca9be5f398da84c6a34f41cb8545d789e3c7b25
SHA5128b05de03e01074239a5adf34a444e5e84639866651ebb51c519bf86ffe6bc41ccb30014f60640b9b92b6cd5f6e4995a355783b3967709e7b4c5cc0e8484e41a2
-
Filesize
11KB
MD546b52feecac89d2efce0fa8c648fdf6c
SHA1307b4b6981e3b6432da7ec378322fe22dc3bb54a
SHA2561a928f7b8d10e60c5756edb231c6ca04d6899b5faa7e30981c155d8a0bd3fbf2
SHA512c227406bed1120209e2ff23044ea9369ebcf26aa9b08369321fa5c9d01f3ffb4cfa0ff07c1a5cc35730b91aae98dd43deb003ca5aa8ae865c4f2ba17d4c18461
-
Filesize
10KB
MD5db1ef7fb52f710eeadc0b1163018d4ab
SHA1f564baab24bc5abcf2d8ea3f22831e0f6991f15e
SHA256875551c3d3f01c6e1bed4c3a3247732a892911aeed407b0093b5ab9c1e945ada
SHA5123a7d9e3c3ad37af6609d18d9461e6813ee3d9015d5f5df6e46039cafd789f86dd4e22d657f6fb50ff86af3d037f0ae464b6bf436f145686c42fca4a222c6e5de
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e