Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe
Resource
win7-20241010-en
General
-
Target
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe
-
Size
1.8MB
-
MD5
333366f899b1211c3259144abeb6e7d0
-
SHA1
b0cd88a3cfb3153a6f40682143b7872ed7abb0a5
-
SHA256
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580
-
SHA512
9697d94ef6f11fcee853bc3615fd3441bc39a529a9eb5a18f8ba81d719485ac3119f260e93b62f90f4f0521e23851c508e12ae258ba29cf914dd1b3f8d3cd1f5
-
SSDEEP
49152:nHFaJdOn16Mp9hamBcxdgirXtyBik8CqX/odohVgmaH:n8a16+3dKdgiAva/hVg
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/5152-722-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
bbd1d4fee5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" bbd1d4fee5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" bbd1d4fee5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" bbd1d4fee5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" bbd1d4fee5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection bbd1d4fee5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" bbd1d4fee5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
5d7a9f43fd.exeskotes.exeskotes.exef6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exeskotes.exe53f365a6cb.exe6bc282057d.exebbd1d4fee5.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d7a9f43fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 53f365a6cb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6bc282057d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bbd1d4fee5.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5552 chrome.exe 2132 chrome.exe 2260 chrome.exe 5388 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
53f365a6cb.exebbd1d4fee5.exe5d7a9f43fd.exeskotes.exef6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe6bc282057d.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 53f365a6cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bbd1d4fee5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d7a9f43fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6bc282057d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bbd1d4fee5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d7a9f43fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 53f365a6cb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6bc282057d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exe5d7a9f43fd.exef6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 5d7a9f43fd.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exe53f365a6cb.exe6bc282057d.exe86e4ed83f7.exebbd1d4fee5.exe5d7a9f43fd.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 3900 skotes.exe 3540 53f365a6cb.exe 2244 6bc282057d.exe 4656 86e4ed83f7.exe 5364 bbd1d4fee5.exe 5152 5d7a9f43fd.exe 5428 skotes.exe 4840 service123.exe 2984 skotes.exe 4472 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
6bc282057d.exebbd1d4fee5.exe5d7a9f43fd.exeskotes.exeskotes.exef6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exeskotes.exe53f365a6cb.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 6bc282057d.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine bbd1d4fee5.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 5d7a9f43fd.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 53f365a6cb.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 4840 service123.exe 4472 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
bbd1d4fee5.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" bbd1d4fee5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features bbd1d4fee5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\53f365a6cb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007891001\\53f365a6cb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6bc282057d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007892001\\6bc282057d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\86e4ed83f7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007893001\\86e4ed83f7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bbd1d4fee5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1007894001\\bbd1d4fee5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1007893001\86e4ed83f7.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exeskotes.exe53f365a6cb.exe6bc282057d.exebbd1d4fee5.exe5d7a9f43fd.exeskotes.exeskotes.exepid process 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe 3900 skotes.exe 3540 53f365a6cb.exe 2244 6bc282057d.exe 5364 bbd1d4fee5.exe 5152 5d7a9f43fd.exe 5428 skotes.exe 2984 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exedescription ioc process File created C:\Windows\Tasks\skotes.job f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 6004 5152 WerFault.exe 5d7a9f43fd.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
6bc282057d.exe86e4ed83f7.exeservice123.exeschtasks.exetaskkill.exe53f365a6cb.exetaskkill.exetaskkill.exetaskkill.exef6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exeskotes.exetaskkill.exebbd1d4fee5.exe5d7a9f43fd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6bc282057d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86e4ed83f7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53f365a6cb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbd1d4fee5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d7a9f43fd.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe5d7a9f43fd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5d7a9f43fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5d7a9f43fd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2768 taskkill.exe 1392 taskkill.exe 3128 taskkill.exe 4316 taskkill.exe 1916 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exeskotes.exe53f365a6cb.exe6bc282057d.exe86e4ed83f7.exebbd1d4fee5.exe5d7a9f43fd.exechrome.exeskotes.exeskotes.exepid process 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe 3900 skotes.exe 3900 skotes.exe 3540 53f365a6cb.exe 3540 53f365a6cb.exe 2244 6bc282057d.exe 2244 6bc282057d.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 5364 bbd1d4fee5.exe 5364 bbd1d4fee5.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 5364 bbd1d4fee5.exe 5364 bbd1d4fee5.exe 5364 bbd1d4fee5.exe 5152 5d7a9f43fd.exe 5152 5d7a9f43fd.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5428 skotes.exe 5428 skotes.exe 2984 skotes.exe 2984 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exebbd1d4fee5.exechrome.exedescription pid process Token: SeDebugPrivilege 4316 taskkill.exe Token: SeDebugPrivilege 1916 taskkill.exe Token: SeDebugPrivilege 2768 taskkill.exe Token: SeDebugPrivilege 1392 taskkill.exe Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 4588 firefox.exe Token: SeDebugPrivilege 4588 firefox.exe Token: SeDebugPrivilege 5364 bbd1d4fee5.exe Token: SeShutdownPrivilege 5552 chrome.exe Token: SeCreatePagefilePrivilege 5552 chrome.exe Token: SeDebugPrivilege 4588 firefox.exe Token: SeDebugPrivilege 4588 firefox.exe Token: SeDebugPrivilege 4588 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe86e4ed83f7.exefirefox.exechrome.exepid process 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe 5552 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
86e4ed83f7.exefirefox.exepid process 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4588 firefox.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe 4656 86e4ed83f7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4588 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exeskotes.exe86e4ed83f7.exefirefox.exefirefox.exedescription pid process target process PID 4588 wrote to memory of 3900 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe skotes.exe PID 4588 wrote to memory of 3900 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe skotes.exe PID 4588 wrote to memory of 3900 4588 f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe skotes.exe PID 3900 wrote to memory of 3540 3900 skotes.exe 53f365a6cb.exe PID 3900 wrote to memory of 3540 3900 skotes.exe 53f365a6cb.exe PID 3900 wrote to memory of 3540 3900 skotes.exe 53f365a6cb.exe PID 3900 wrote to memory of 2244 3900 skotes.exe 6bc282057d.exe PID 3900 wrote to memory of 2244 3900 skotes.exe 6bc282057d.exe PID 3900 wrote to memory of 2244 3900 skotes.exe 6bc282057d.exe PID 3900 wrote to memory of 4656 3900 skotes.exe 86e4ed83f7.exe PID 3900 wrote to memory of 4656 3900 skotes.exe 86e4ed83f7.exe PID 3900 wrote to memory of 4656 3900 skotes.exe 86e4ed83f7.exe PID 4656 wrote to memory of 4316 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 4316 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 4316 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 1916 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 1916 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 1916 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 2768 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 2768 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 2768 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 1392 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 1392 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 1392 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 3128 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 3128 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 3128 4656 86e4ed83f7.exe taskkill.exe PID 4656 wrote to memory of 3904 4656 86e4ed83f7.exe firefox.exe PID 4656 wrote to memory of 3904 4656 86e4ed83f7.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 3904 wrote to memory of 4588 3904 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe PID 4588 wrote to memory of 2476 4588 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe"C:\Users\Admin\AppData\Local\Temp\f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\1007891001\53f365a6cb.exe"C:\Users\Admin\AppData\Local\Temp\1007891001\53f365a6cb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\1007892001\6bc282057d.exe"C:\Users\Admin\AppData\Local\Temp\1007892001\6bc282057d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\1007893001\86e4ed83f7.exe"C:\Users\Admin\AppData\Local\Temp\1007893001\86e4ed83f7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {45c443d6-7b93-42c2-b929-185f0fe0add1} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" gpu6⤵PID:2476
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3859cb1-0a78-42d7-9f83-a9de4dd0eda4} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" socket6⤵PID:4984
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3076 -childID 1 -isForBrowser -prefsHandle 2760 -prefMapHandle 2896 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b69706b-f6e8-4fab-858d-22ba07db376d} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab6⤵PID:1664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3888 -childID 2 -isForBrowser -prefsHandle 3864 -prefMapHandle 3860 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04bc1feb-aa16-4315-84f9-fc06580b2e26} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab6⤵PID:2916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4816 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4744 -prefMapHandle 4720 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd2e718c-6172-4c68-b07a-628e63eb6ce7} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" utility6⤵
- Checks processor information in registry
PID:5216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5292 -childID 3 -isForBrowser -prefsHandle 5116 -prefMapHandle 5236 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f69f15eb-c7f4-48aa-87c6-15037f67aa48} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab6⤵PID:6016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5460 -childID 4 -isForBrowser -prefsHandle 5536 -prefMapHandle 5532 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a2a0d89a-c635-449d-b0c1-f01d90527f5e} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab6⤵PID:6028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5664 -childID 5 -isForBrowser -prefsHandle 5672 -prefMapHandle 5676 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cca89fc-a57c-4f07-8fb3-d926401f42bc} 4588 "\\.\pipe\gecko-crash-server-pipe.4588" tab6⤵PID:6040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1007894001\bbd1d4fee5.exe"C:\Users\Admin\AppData\Local\Temp\1007894001\bbd1d4fee5.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5364
-
-
C:\Users\Admin\AppData\Local\Temp\1007895001\5d7a9f43fd.exe"C:\Users\Admin\AppData\Local\Temp\1007895001\5d7a9f43fd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5152 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5552 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffef74acc40,0x7ffef74acc4c,0x7ffef74acc585⤵PID:5672
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2328,i,7244520094415543681,11947265194307767926,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2056 /prefetch:25⤵PID:3952
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1712,i,7244520094415543681,11947265194307767926,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2468 /prefetch:35⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2080,i,7244520094415543681,11947265194307767926,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2572 /prefetch:85⤵PID:4208
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,7244520094415543681,11947265194307767926,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,7244520094415543681,11947265194307767926,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3220 /prefetch:15⤵
- Uses browser remote debugging
PID:2132
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4280,i,7244520094415543681,11947265194307767926,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4252 /prefetch:15⤵
- Uses browser remote debugging
PID:5388
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1816
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5152 -s 12964⤵
- Program crash
PID:6004
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5688
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 5152 -ip 51521⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4472
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD54ea617ce2ae0ef7b66a2312e4b037bbb
SHA1931cade39b20a290dc778670dacf304b8a538541
SHA256fc72282616bbe306799038cd6033336f4a45c32a301d04a2f076edc5073b8996
SHA5129579bff51868d87e615f719bb5a821eb401cd5c6b4feb3af1205a50ae726e944121429d832a65197f7962c804d7422b821b2adb29c9538cc106dfde1174fb3ec
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD530806199a5d245538f247242667ab953
SHA1e8499266be38bbb47619b1c2019fd05da0753de4
SHA2567a4110c6b80b2896496b556a37d997395bcbb84478945bbb8f4cd12b20b22df2
SHA512ed4d02b6f0d05527a94ef0f99db3e8e292d92809bb2fc83faee0480f3d296b526063edfed7f36cd5bf4492805a8e99efe669eddcc8598916c284afad849f5735
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD55321abd485f135b87109bbb9c83fdbea
SHA171a5ef7e3a6e5f8cb3980aceccc94bdcc89e55fc
SHA256d0b9c9adb4f17d944b067d4344cff79c4842c351a674630258b40a7bb6833997
SHA512be08615d87d8063bc11657b849f1f0a3ec7f3f88d9945c8be247c074fb4b7cd61a9dec52bf30f0f0a3ae58ae2f19027aff5251a0de2f7a3e3dad3ee73681358d
-
Filesize
1.8MB
MD5488bd6074ecda6e7b366fe4e8ee1663e
SHA14bf333bea71cb9d0bb85a449410b650af8401a2e
SHA25689d978af6498f856d25efa829c81c55a8ba4ba46e1a0995d097be081e5b0eafc
SHA512f149779103d2626535a64e54b7c8cbfaf2a9db448b376d52c80a796c22b6451162a94504c2a9506f14581aa119ea73895882bf5913c3123edf73348512b5fb97
-
Filesize
1.7MB
MD5c2cf363b2da0c5b29e372b342e0385c9
SHA1b69d9a2af6b918129330c74ded7d18f49c3c14bf
SHA25625289cd2afe05685632e8eb6b6170ff9c876b726dd1bf67543121d44bc384387
SHA512ddb494900a8cfab33d15eaa633fd7892ac4cb19ccb377b891093cb4ce9991354770c69daab8eb3c68641ff6181eb4a11ada2cd50ef28c02fd8c70a9b6d0d78bd
-
Filesize
901KB
MD5e0069f2a4d93d9c0e7c155264c27d946
SHA14c78774064bbfa8fd5f401c7b4861e2128da9d05
SHA2565ef88aaea0fe174fd198cc9ca3df10ac21352f011c0556c3a9f9e190943d1196
SHA5123d6eea0e53b471f6a7ff1086e45d46f3832da2ef6a05a87272cae997721c17df90c4e4975a02eaec80a4f75919b9a2c31edb2eddce2e9abc8ecc48751df28b76
-
Filesize
2.7MB
MD5221ec47d716b0b9fd63af32c2b339498
SHA1e9dbcdb2d15e0aa0d61765e87ea1366ae3ddf026
SHA25690701cbd3a9e578dcb6f27683bcd18a190c56257e21b824645c16fddee7c4ef9
SHA512c6c78183bf96c21808c656d0c9536c296206f138a708b80811d67a66aa1a1dd14faf526e4fc575b592029a741ab442abb1264c9d2ff6693be21e61e5eadb4047
-
Filesize
4.2MB
MD51a688ed7f5d7ce8f0155133ad0a2e60d
SHA17a71b0ee7f99ca9e0b61b105ce9fd8478012c19b
SHA256bbba491abc5c69486fa59fb1e1b5ddc5d3942a107ac8e149795b55e66e3f0111
SHA512512961729a2aafa06d778b779ad46891b2247e14530919177aad184a1e3589d5b5993b1dadae16af69680942e64af0c2088ee1852a725a2b47151e94f62cc9e9
-
Filesize
1.8MB
MD5333366f899b1211c3259144abeb6e7d0
SHA1b0cd88a3cfb3153a6f40682143b7872ed7abb0a5
SHA256f6b3275a6874dfae98dd683ff84c5d9894a17d86eb45c1cf0b621ad54a680580
SHA5129697d94ef6f11fcee853bc3615fd3441bc39a529a9eb5a18f8ba81d719485ac3119f260e93b62f90f4f0521e23851c508e12ae258ba29cf914dd1b3f8d3cd1f5
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD5dc37ea0372ada3346bac8bdb4d7385e5
SHA13c0fa96ead94669080faa58db65074eee7278aa2
SHA25698252bb807ca0adda8da69491ef289e6387630fc29c130216a40b3d6e2a8b9a3
SHA512243c390a4968d2f677ef1bd26ff4bcdf9b9019bb43b4c0944c31571fe96c60f493790d8f653c2ef0d8432b6861a395269f3b6f6dc2e76076fc935b879ac922dc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize8KB
MD5281681ab4428ac35dfa32f6a55431eaf
SHA1f18c5175a8c508dc4572b696f5401b56f32699a0
SHA25613f6eac834d671e41dcc786706d816a1ff2a42d6a865e244445d8f099f93e246
SHA51232b1979c5550390a7632f1eae55da19acdd3b9d17972d63f81caa789e2471381d9871ee7ca828d05da1f32c70868573780518b97141f530eee32c53c220b705d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5333aeeb753f2a32de423ce5778a82a97
SHA1266a88f4045b854b0799d1982feda190b5526e81
SHA256490357f2aec08e283c927e70e66ec9da987fa849bb575100528c2eb790777381
SHA512b90d3a02b67c1607e79de43d9b7b75d332e43dd7740ceac6f47350618fcb06a2b12fbedf624c35d873dec772283eb305da0b4a20d1eced7e4976215045574486
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d55f73e506ddd41db0a002354f8600ac
SHA1d9e756719240ff473f10e1f21005ce5326a91434
SHA256c0b6975d7dd40a678fbac00e6d01ce61e5c38d66692c6fd3ce8d1bee872536b1
SHA5122285e6055124020865ae6767a15b7337d009e0439d040e6d6694a0dcc2e6bb3419bec962015efd8fc64a96bbaeef1532f78f86efce9d6200170b9579f9d47b84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\47edb8e0-5b83-476b-9258-1cba11753d36
Filesize25KB
MD5be356a9fd0f0be699b1be66222509c2c
SHA1d8636cde622bdba96fc4a06858ab0b959032bccf
SHA256b2c58eabc4393ec20d420ff9c064be55fb73ca2d52502ac33b320b4bb8eeb9b3
SHA51256d33c7bf9014d65fd99048872b32901f8a26002b02ee6358702bb5c213c9bd059a08c74453d223f5bfd820463e1640d4c8ad46e44d365fb19585e12e020158e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\615572a1-b5db-4b71-9fe2-afbfe516fe60
Filesize982B
MD56ccedac681baf1a130ba475af883ac14
SHA1368cdbd91ac8861052f2b4959f2e8ee0f3dd92d6
SHA25618d9ff92ac3235f2516da5822e444a8b232429a70d0736f00ef0a96618342caf
SHA512a9df4f4adfe7268673c74b1199c14a2a7a679fc539690f0aa0c9c45a1f87e7450582418fd9464231e6b138153de27f67452c6585254ce01d7a7d47257dad21d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\e61daf50-2824-410d-ac21-646a9d665338
Filesize671B
MD566276156ea330a30228bd8341288ac37
SHA196cd8d519a888ab1f20ca62b9f410dd4cbdebefa
SHA256227734e0a7f371e859ba51cccf18a560ffc4ac7ba5adb1158fa92b7f3b79d618
SHA5121fa509d2e8af2660d27cbea63761529a6de1782a144dece7dfc7f4408bb43c6e987a3475cb306d693d93fb5ad19c28dc1b6cadb2c1b42c11e2d4b48a666529cf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD520a3739833e349102003f48ef0c246df
SHA127c31ed5d1f8c1a669f404f1d5f50e1c9676a6b5
SHA256c4f511264a6180a76ae07d644d85a940bb8f84f5f95a48caa4fb30fab22fce0c
SHA512e869544fb4ec5260c33163279730624b0e0e6ed090c10a4a1d9a2c4508cad44435ad8dbbad6b21b8f466e63ed1890e6bfbb849460f85b481dfb7db649fddce61
-
Filesize
15KB
MD569000b6bbcc05a8fa743edc5b42de9eb
SHA1a76ccc4ee4367717a3cfd54f01596351bd2c1e43
SHA2569e5f7a95cf7a66e4f2fe2faf4fb562c2e77236ee11d07c7bbe063ac7c22bc348
SHA5124f3c7469f99b570423b5fb72feb043adeb48f791ed2fbf292eab1b10e12b65117b388ef8868be5aacf858361f5fa33c8649adfbd6ffdfd02674f6e1b8f8ca6c9
-
Filesize
10KB
MD5f29f3418132dbaaeda98752647bd29cd
SHA1997a42bac1c0cce1cf4473a3d2492984f50d7a19
SHA2561349bfd723d9a88dd0081222ea4849423b25ea8751cccba40d49083c4f1b85c7
SHA5120d6fd231f95d607110c0c1fe98ea03ffe3a48c3c650dc00840d586bf20274861517eb55a2216ebe4dec1f6ac7b45fc59226067983d16d478ee11ec26a0fc682c
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e