Analysis
-
max time kernel
20s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe
Resource
win10v2004-20241007-en
General
-
Target
6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe
-
Size
1.8MB
-
MD5
68c848d7232e6525935d7e337f37d624
-
SHA1
6cef0f74d1fbb478d975eaf516a881c3fd833b15
-
SHA256
6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3
-
SHA512
1aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310
-
SSDEEP
49152:4DGXEI7OU0hl2LQAGNWGFuC/ywcldX2wZads+gH5:+LI7f0+qFAC/Asi5
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ acde65e8ef.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cb1e66f484.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6cb79cf513.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4848 chrome.exe 3840 chrome.exe 3076 chrome.exe 5744 chrome.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion acde65e8ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cb1e66f484.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cb1e66f484.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6cb79cf513.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion acde65e8ef.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6cb79cf513.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 5 IoCs
pid Process 764 skotes.exe 4420 acde65e8ef.exe 540 cb1e66f484.exe 436 6cb79cf513.exe 4912 1ea40064ae.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine acde65e8ef.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine cb1e66f484.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 6cb79cf513.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6cb79cf513.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007857001\\6cb79cf513.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cb1e66f484.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007856001\\cb1e66f484.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000a000000023b9c-84.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 764 skotes.exe 4420 acde65e8ef.exe 540 cb1e66f484.exe 436 6cb79cf513.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5188 4420 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acde65e8ef.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb1e66f484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6cb79cf513.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ea40064ae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 5 IoCs
pid Process 3344 taskkill.exe 3308 taskkill.exe 3636 taskkill.exe 4224 taskkill.exe 3348 taskkill.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4432 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 764 skotes.exe 764 skotes.exe 4420 acde65e8ef.exe 4420 acde65e8ef.exe 540 cb1e66f484.exe 540 cb1e66f484.exe 436 6cb79cf513.exe 436 6cb79cf513.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 4912 1ea40064ae.exe 4912 1ea40064ae.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4912 1ea40064ae.exe 4912 1ea40064ae.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 916 wrote to memory of 764 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 82 PID 916 wrote to memory of 764 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 82 PID 916 wrote to memory of 764 916 6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe 82 PID 764 wrote to memory of 4420 764 skotes.exe 88 PID 764 wrote to memory of 4420 764 skotes.exe 88 PID 764 wrote to memory of 4420 764 skotes.exe 88 PID 764 wrote to memory of 540 764 skotes.exe 91 PID 764 wrote to memory of 540 764 skotes.exe 91 PID 764 wrote to memory of 540 764 skotes.exe 91 PID 764 wrote to memory of 436 764 skotes.exe 92 PID 764 wrote to memory of 436 764 skotes.exe 92 PID 764 wrote to memory of 436 764 skotes.exe 92 PID 764 wrote to memory of 4912 764 skotes.exe 93 PID 764 wrote to memory of 4912 764 skotes.exe 93 PID 764 wrote to memory of 4912 764 skotes.exe 93 PID 4912 wrote to memory of 3636 4912 1ea40064ae.exe 94 PID 4912 wrote to memory of 3636 4912 1ea40064ae.exe 94 PID 4912 wrote to memory of 3636 4912 1ea40064ae.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe"C:\Users\Admin\AppData\Local\Temp\6a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Users\Admin\AppData\Local\Temp\1007851001\acde65e8ef.exe"C:\Users\Admin\AppData\Local\Temp\1007851001\acde65e8ef.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4420 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
PID:5744 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7fff4c84cc40,0x7fff4c84cc4c,0x7fff4c84cc585⤵PID:5768
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1960,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1956 /prefetch:25⤵PID:6100
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1824,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1996 /prefetch:35⤵PID:3468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2456 /prefetch:85⤵PID:3916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:3840
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3180,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3260 /prefetch:15⤵
- Uses browser remote debugging
PID:4848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4508,i,10613994999794760986,5915446086932053143,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:15⤵
- Uses browser remote debugging
PID:3076
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵PID:2644
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4432
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4420 -s 18484⤵
- Program crash
PID:5188
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007856001\cb1e66f484.exe"C:\Users\Admin\AppData\Local\Temp\1007856001\cb1e66f484.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\1007857001\6cb79cf513.exe"C:\Users\Admin\AppData\Local\Temp\1007857001\6cb79cf513.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:436
-
-
C:\Users\Admin\AppData\Local\Temp\1007858001\1ea40064ae.exe"C:\Users\Admin\AppData\Local\Temp\1007858001\1ea40064ae.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:3636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- Kills process with taskkill
PID:4224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- Kills process with taskkill
PID:3348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- Kills process with taskkill
PID:3308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- Kills process with taskkill
PID:3344
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1836
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵PID:668
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1964 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45778960-9b0a-4f6b-b9a0-f16f0aeac09e} 668 "\\.\pipe\gecko-crash-server-pipe.668" gpu6⤵PID:2008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2400 -prefMapHandle 2396 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {92892e16-5ea3-4d14-9cb4-cef8d8008099} 668 "\\.\pipe\gecko-crash-server-pipe.668" socket6⤵PID:980
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3368 -childID 1 -isForBrowser -prefsHandle 3284 -prefMapHandle 3364 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {10ccef32-a590-4226-a5e4-b5c0642d4dbe} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab6⤵PID:2608
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3708 -childID 2 -isForBrowser -prefsHandle 3720 -prefMapHandle 3736 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9667608c-ac2d-4be4-98c1-a5ce14c8b52a} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab6⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4640 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4552 -prefMapHandle 4544 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8ea9885-ea73-4730-971d-b64951ebf397} 668 "\\.\pipe\gecko-crash-server-pipe.668" utility6⤵PID:2932
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5344 -prefMapHandle 3760 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c65e8c9-1529-4310-94a8-8052cbf0603b} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab6⤵PID:5844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5464 -childID 4 -isForBrowser -prefsHandle 5472 -prefMapHandle 5476 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fa5b80b-d56a-4b1d-b407-2c1c0ce6c97c} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab6⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5656 -childID 5 -isForBrowser -prefsHandle 5664 -prefMapHandle 5668 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {2847a326-646e-4bda-a16c-a15585657813} 668 "\\.\pipe\gecko-crash-server-pipe.668" tab6⤵PID:5868
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007859001\25aaa6a2ff.exe"C:\Users\Admin\AppData\Local\Temp\1007859001\25aaa6a2ff.exe"3⤵PID:5936
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:3116
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4420 -ip 44201⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵PID:5484
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵PID:5672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Authentication Process
1Modify Registry
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5f1afa889518cb64e94d6c5be55d4df39
SHA113d00ab6fe9696b4152f9149e4e34d16fac2c446
SHA2564e3f3c9f0cd2ba5bffb99df78e3e3c77203e27eb39f9bd37992c92951c79b1b9
SHA51224af17aa444713f23426a827dbb31726cc16ecf042e235fffdb14d97cb0110e6f3d6c3d8f7afb2d43067509f2080fb487756873e6259f18a03675c42150cee62
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5eb99acf849b299e921a02b1466f1e135
SHA121af7c7ba9ed35ddd6be57bb5f85edc4224db6d4
SHA25643e74c2aa5ae76ace1de39a9f8da964f491a91deab1f2b95e319c242d3130851
SHA512982a8fbb69d92904ea9a13978931fd1807653c499c98080e200e5429f033fd2403c68e0b1dff6f78f0f0224727ad829e6fd1a32732948ed745f0024c0e3ad638
-
Filesize
4.2MB
MD57dfd0e3781e268e2e6d5f6e8712455fb
SHA1beb4b1e543d14e26c3ddccfe324eb8f3ba67194f
SHA256273813e96ea6dad4fdbeb9d791929caf69b193f488d9adc7cf66cf00a8b5b098
SHA512fe62997c3cde4125871681f8c85986e5f598cd6e03cdf76d916cf228ff85bbbd56450fed2585837b48f74167e0d8404e7e247d9087be5dad41d67cd391b2e57d
-
Filesize
1.8MB
MD54658dfd86a5c61df7f4dc30347017718
SHA12e998b513681d11bfe238b4dd95849bc78fc8296
SHA256970d268afd9c4051c591faa72ba2da6351852ec16ba8f664bb5813a0238ea243
SHA512dfcfceda932596cce40bf9d9ccf6bd2c58c43a6184cd75875f5797ae0ee0d1699662bf5b4b19f644d068439fc85a2c5431805881b8874e100ce4e2d111609ca5
-
Filesize
1.7MB
MD53b43c7942554833f316cf7108b571f8b
SHA1f6f15b0a739eac16980144cbc1b7e2579fe9141a
SHA256a782058a0f3fe32eddc56aa22a302f5c1d7f718e434cf2c547336ace69a680e2
SHA512f12e5b6a73c6c75a1641b31446aac4111d1326b6186f9b3a70b4527256f6f4a9325382daedd89524afc2f4137536a8e6350849a18a9da769ddb834e85c7b0226
-
Filesize
901KB
MD52fc35a6db90cebc471ecfb0f4b67d539
SHA1605048a60ca39c75842027d47ae1f9b45194591b
SHA25685e6e158869ed15870cdfef9adffc26df902d42f12540bf0e087e749526b4309
SHA51200b257d36ccb6ad3c20550e52163e3612cad14443978d42a6290462340aa9cfd2392dcf5f27c6cc6f8a4a14d5cca090f2d646debb0bd532e11dbc7fca116ceee
-
Filesize
2.6MB
MD5b6232971846816075fb9476cb82148fb
SHA132fdc8249eb381bdc6733092b6be00d3bdab5d2e
SHA2561a1fa8992c84f43a7d642d63ccbc350eccf35263a9aa097709ad75fa13bc69d7
SHA5127f861f5086dddbd0939f303a78b1ad00464d666171448e7d386318b988a09434ace95288dbe0f4dc51cca39dacbed97b405b111e149ca31d3ca1ff4f3cab781a
-
Filesize
1.8MB
MD568c848d7232e6525935d7e337f37d624
SHA16cef0f74d1fbb478d975eaf516a881c3fd833b15
SHA2566a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3
SHA5121aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
6.9MB
MD5ab37ad005cd751dbb27f500e3b949c13
SHA1363480512e5c4415b50b44c34f905ec74cd40092
SHA256301736a7d86ec8704f02cce4449b7ce872fbb2c443db9f57ec811d68131d72cb
SHA51239b7c6d26d294427efdc50e6a777fccc695883cf911067846a907fc0f499638bcab5a2e5c1658c8e7598ee226c3ad7f78427578b7d1270f61d8f800c9c74ef6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize18KB
MD54c327bb82b896df006468858dc6104e3
SHA1f25901dc2ccc3b475d3058bab98695e5e73f7b8f
SHA2567a9d9495c293438e94076ed9ebfdaabcaad56a2699e5007f10a5d5f4649cdce3
SHA51214a0803ffa91f2c1500f7515e164c2e0cb8d0dc8f211ef1c09dec14722f98843ad9bfe6b1ac4500645b5212e6246f7069e42327dfdc9332c0f68f77f1a9ce94e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD57d2a77433b37c2703409c47696a9b929
SHA15f199a585933cd82a4ed95ade4fb41a6d101b060
SHA2563806509be84d154f7e584b464b5d256104cffa9d2de7b5bfe8c114161724e023
SHA51219a793514b69b70759bbfb2920a5338bb53883f8687b46f5e5b8e2a175e78de45a7805592f27fc435fdc9f935cb9be91cc218d9184bf35bd2009d83d1b2d4f5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54f42280313ff4b1befcfd13f18122002
SHA11c55d3a869ca30d44fd4d8658fe02f766dbdd9c5
SHA256418bff36f93810aa2e2341254845313b7eaad5d0dd79d590e42f5d54dde6c1cf
SHA5124a2bd0cc67dc45168ea5d17b4db922a9d3d6dd161d4eef59b45b8c15b20830e981345da111696de8ec661208813cc18b3ef9b2b121d535cf3f1126973acc66fd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5a194115d82c74a924c59b273615a4033
SHA19cb0e290b298d3b43b86f0dce27793001715228f
SHA256699df82f93b25aa880843cb88364614877c6852c058a6c10d3cc2619b9bf58f2
SHA512df35bfa49520c6172e404338cd5eb9e578d8d1fe58b552beb53269838be6cd24a4581f633990ee75f1fe85ec9383990f9fbcb556d7c96042541390abb044c82a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD566c77a3931ee7de9a62112e3fbe41df6
SHA1c6b7c51b2622971d22b8610efb53c4a0764fb126
SHA25649e148fb0ea330daa54d2ffa9f42d79be41e5a15e2e4ba31227fdd2b68ef268c
SHA512a25af731c8f1c88dea3727cc41abcc76447c665f0295aec07fae077016ae54d6302700dd667644e7195f25885ca3a35967fca5d7e57b7ef69a31c1b6c7a54bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD57a221ab905970c44b11d4cdb3c0743b4
SHA1dc3928f4b1995cbbecdbb886906f01bdaa3f8d55
SHA256f8ef96315a0135c669427192422348e67e2fd8d9b1575386a7acd36bedea124e
SHA512261d59b6176f8751d1ac5b87dc559e3552c5c0e22f68ba063e2b30e204a2328d0491d6959dfb462a343b65a26efdfafa9787e6d000bc5fcf0552587f1bbe56d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\86fea6e1-401a-4e67-9d39-371ca7cfcfaf
Filesize671B
MD58c39d1c20e0b4588aa503c8c9dcf902d
SHA14176db0c4aa6f10db99ca02d26e0097834d7e31e
SHA256779faa795c02083c290b4f88595c32b401aa13b109aec58def90154e12efd0ff
SHA5125a9485b4e26fc553df87aa46ac8156318b883f00e8586c15e388b8318da22b111a21328737acc9283a330d13437e418d1d9777a414e47e5c73315d6bdcc55f7f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\ba1d97bf-2c64-49a8-8e51-9f0d61dd0958
Filesize982B
MD5d0a6ab813d9a63f603d0aed28a7191c3
SHA1630cf72ae1eee1839231e9c66f33ef9f916ebf15
SHA25605175bfd1bbb6cdce6c5c910344ffb11edf81e68a926520c2d60bc81e270a39e
SHA51201834d360a44fd00bb58d9e75b2eba09df9c57977ab19dd4dcbf61bd7d68541712fb445f2cf4789db577c7bc4ff1903ba8e98045c7bb5ed7eca3511a130e3aa1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\f9b0e79c-e043-4ebe-acff-3bb6cda7d2c4
Filesize26KB
MD57067a15227f0995a3e90542a642eb46c
SHA1515c6ae6cbf7ee900155edd0125a9d741993bf8e
SHA256ceb4d2fbaba2a930ffb69ba36ec9412c69af99b96e8f52d6013b8b9404968747
SHA512d1f30a117bcee2a1a37c8c3c14a1b7b3f21494a26dda2170c5bfd4aed8422464e0c3fa4bab11c2f3ba41a086ef7d769891283a6faced70bdd91dce33b61e35ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize8.9MB
MD5ffeb63768c7f4cfbe934769988ce305d
SHA15fc8ed105f1664087183c6b1ee37ea804510bd9a
SHA2569ca3872f7b578bf9002bdeaab27707073afe07783553755127bb803f117e9a84
SHA512f56d5fc93af12612ac1f196cdeaf09b8bfb0605a4f414d3f8b5afb93f3a71c72806e972a841780f3d45a75e3a9149890533ffe32140f3294cd2254fb6864e367
-
Filesize
11KB
MD58cc65d46feb8b58e99d44d1f8bc76911
SHA17fb4dfff5e1db5928575cb724edfe34935fa7ecb
SHA2567584d053c7db87ae1cdd96ef2a2a0c56d0cf1d76f293fbd97ecd232c19c0ebaa
SHA5120f293cf36c84ee42dac2db5e536f65ffcb8c397f6c3b8629b6ff3fb351a9b3c8f96bf33ac4d61120ee2dc95ee275bb017ddefe8c04d4af75f02311d56a1324ae
-
Filesize
10KB
MD52c3f8dd930d08f58de4ea0360a3d392c
SHA19b59193cf989a6c7f6d7c2c676369aca267b98e3
SHA25623cbc27be050b8ea6e11a9db4722ab827ee0d9bd615d98b4d0412b425a84db0f
SHA5126c83ab7d36e109c5f8e64f24b01a5628b0c20814c29918fc78d3b8bdf1b9c066f6de3c89acb40e3a38dcd1d687ab1203d7c39ca1e5c72b416677791661de023f
-
Filesize
15KB
MD565015be7a6aa4bb99f1cc4d39bdd9d6a
SHA11862c76de3c4262718696a92871a34fb3b305d57
SHA256992e5b19590f23b7d4b630e08ce27e44da839339561b0fee0c41898fed46a022
SHA512d2e22c862e6a2d654dfd77ac55cd1e00fff7a385d4da21d2b5f6f4b094c440d6a76d30c40c210d4aecaac31287fa5bce8aa36695d3972af146aabd2e1dae4636
-
Filesize
11KB
MD528b7535e36c57a587cfbdd8a5043d0f0
SHA18c4e99ecd0698976a12de6030826d0085ccf6535
SHA2561b805a7453ada6c31342449c6138012b121e45ad865e2d19bff61299d22edc08
SHA51219d7296df3ba5e8f1e5f7f061176d4c0be5686d76376a61b523e47a3de43d11490b1c2f55ebe1b9cb6d1ab869090cf4a501cae064e2f524910ab8eb609dd8d23