Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 03:00
Static task
static1
Behavioral task
behavioral1
Sample
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe
Resource
win7-20240903-en
General
-
Target
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe
-
Size
1.8MB
-
MD5
873f4ff6922f79aca237323377183153
-
SHA1
c0e782ab9058afb71626fae94fdd996cbeda934a
-
SHA256
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271
-
SHA512
7fa1c35440711d5f2ac374678ba37b485e73e9e592ea1592268db5420b35c374595b79050ced86cbed22ffe9bfb94a5799527a0e375db37f2a186c911f1c10e8
-
SSDEEP
49152:Kpe2Nf+D/CmuxmmCTHmn0sPx6rvwEyw1lkpR4Yk4Pbdt50O:R21ya98mYUPoroVslWuLebdb
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4992-64-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
c4029391e0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c4029391e0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c4029391e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c4029391e0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c4029391e0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c4029391e0.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c4029391e0.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exeaa68b27825.exeskotes.exebafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeff26f93002.exef905700ad6.exec4029391e0.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa68b27825.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff26f93002.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f905700ad6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c4029391e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5272 chrome.exe 3684 chrome.exe 5916 chrome.exe 5904 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
ff26f93002.exec4029391e0.exeskotes.exeskotes.exebafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeskotes.exeskotes.exef905700ad6.exeaa68b27825.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff26f93002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c4029391e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c4029391e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f905700ad6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f905700ad6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa68b27825.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff26f93002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa68b27825.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeskotes.exeff26f93002.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation ff26f93002.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exeskotes.exeff26f93002.exeaa68b27825.exef905700ad6.exee0f5b78eff.exec4029391e0.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 1144 skotes.exe 1108 skotes.exe 4992 ff26f93002.exe 4264 aa68b27825.exe 3816 f905700ad6.exe 876 e0f5b78eff.exe 5992 c4029391e0.exe 2536 service123.exe 1956 skotes.exe 2472 service123.exe 5004 skotes.exe 4672 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
ff26f93002.exef905700ad6.exeskotes.exebafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeskotes.exeskotes.exeaa68b27825.exec4029391e0.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine ff26f93002.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine f905700ad6.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine aa68b27825.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine c4029391e0.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 2536 service123.exe 2472 service123.exe 4672 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
c4029391e0.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c4029391e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c4029391e0.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aa68b27825.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008091001\\aa68b27825.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f905700ad6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008092001\\f905700ad6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e0f5b78eff.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008093001\\e0f5b78eff.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c4029391e0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008094001\\c4029391e0.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008093001\e0f5b78eff.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeskotes.exeskotes.exeff26f93002.exeaa68b27825.exef905700ad6.exec4029391e0.exeskotes.exeskotes.exepid process 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe 1144 skotes.exe 1108 skotes.exe 4992 ff26f93002.exe 4264 aa68b27825.exe 3816 f905700ad6.exe 5992 c4029391e0.exe 1956 skotes.exe 5004 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exedescription ioc process File created C:\Windows\Tasks\skotes.job bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5712 4992 WerFault.exe ff26f93002.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c4029391e0.exeschtasks.exebafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeff26f93002.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeskotes.exeaa68b27825.exee0f5b78eff.exetaskkill.exef905700ad6.exeservice123.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c4029391e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff26f93002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa68b27825.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e0f5b78eff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f905700ad6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exeff26f93002.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ff26f93002.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ff26f93002.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 872 taskkill.exe 3520 taskkill.exe 1988 taskkill.exe 2536 taskkill.exe 720 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeskotes.exeskotes.exeff26f93002.exeaa68b27825.exef905700ad6.exee0f5b78eff.exechrome.exec4029391e0.exeskotes.exeskotes.exepid process 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe 1144 skotes.exe 1144 skotes.exe 1108 skotes.exe 1108 skotes.exe 4992 ff26f93002.exe 4992 ff26f93002.exe 4264 aa68b27825.exe 4264 aa68b27825.exe 3816 f905700ad6.exe 3816 f905700ad6.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 5992 c4029391e0.exe 5992 c4029391e0.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 5992 c4029391e0.exe 5992 c4029391e0.exe 5992 c4029391e0.exe 1956 skotes.exe 1956 skotes.exe 5004 skotes.exe 5004 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exechrome.exec4029391e0.exedescription pid process Token: SeDebugPrivilege 2536 taskkill.exe Token: SeDebugPrivilege 720 taskkill.exe Token: SeDebugPrivilege 872 taskkill.exe Token: SeDebugPrivilege 3520 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 4052 firefox.exe Token: SeDebugPrivilege 4052 firefox.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeShutdownPrivilege 3684 chrome.exe Token: SeCreatePagefilePrivilege 3684 chrome.exe Token: SeDebugPrivilege 5992 c4029391e0.exe Token: SeDebugPrivilege 4052 firefox.exe Token: SeDebugPrivilege 4052 firefox.exe Token: SeDebugPrivilege 4052 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exee0f5b78eff.exefirefox.exechrome.exepid process 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 876 e0f5b78eff.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 3684 chrome.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
e0f5b78eff.exefirefox.exepid process 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 4052 firefox.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe 876 e0f5b78eff.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4052 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exeskotes.exee0f5b78eff.exefirefox.exefirefox.exedescription pid process target process PID 2588 wrote to memory of 1144 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe skotes.exe PID 2588 wrote to memory of 1144 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe skotes.exe PID 2588 wrote to memory of 1144 2588 bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe skotes.exe PID 1144 wrote to memory of 4992 1144 skotes.exe ff26f93002.exe PID 1144 wrote to memory of 4992 1144 skotes.exe ff26f93002.exe PID 1144 wrote to memory of 4992 1144 skotes.exe ff26f93002.exe PID 1144 wrote to memory of 4264 1144 skotes.exe aa68b27825.exe PID 1144 wrote to memory of 4264 1144 skotes.exe aa68b27825.exe PID 1144 wrote to memory of 4264 1144 skotes.exe aa68b27825.exe PID 1144 wrote to memory of 3816 1144 skotes.exe f905700ad6.exe PID 1144 wrote to memory of 3816 1144 skotes.exe f905700ad6.exe PID 1144 wrote to memory of 3816 1144 skotes.exe f905700ad6.exe PID 1144 wrote to memory of 876 1144 skotes.exe e0f5b78eff.exe PID 1144 wrote to memory of 876 1144 skotes.exe e0f5b78eff.exe PID 1144 wrote to memory of 876 1144 skotes.exe e0f5b78eff.exe PID 876 wrote to memory of 2536 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 2536 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 2536 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 720 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 720 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 720 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 872 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 872 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 872 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 3520 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 3520 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 3520 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 1988 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 1988 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 1988 876 e0f5b78eff.exe taskkill.exe PID 876 wrote to memory of 3220 876 e0f5b78eff.exe firefox.exe PID 876 wrote to memory of 3220 876 e0f5b78eff.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 3220 wrote to memory of 4052 3220 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe PID 4052 wrote to memory of 4012 4052 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe"C:\Users\Admin\AppData\Local\Temp\bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\1008090001\ff26f93002.exe"C:\Users\Admin\AppData\Local\Temp\1008090001\ff26f93002.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3684 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa1fcbcc40,0x7ffa1fcbcc4c,0x7ffa1fcbcc585⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2348,i,3320025092703842545,7309004132200398743,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2344 /prefetch:25⤵PID:216
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1712,i,3320025092703842545,7309004132200398743,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2592 /prefetch:35⤵PID:1736
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1892,i,3320025092703842545,7309004132200398743,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2600 /prefetch:85⤵PID:2472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3140,i,3320025092703842545,7309004132200398743,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3136,i,3320025092703842545,7309004132200398743,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:5916
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4496,i,3320025092703842545,7309004132200398743,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4536 /prefetch:15⤵
- Uses browser remote debugging
PID:5272
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2536
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3256
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 13644⤵
- Program crash
PID:5712
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008091001\aa68b27825.exe"C:\Users\Admin\AppData\Local\Temp\1008091001\aa68b27825.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4264
-
-
C:\Users\Admin\AppData\Local\Temp\1008092001\f905700ad6.exe"C:\Users\Admin\AppData\Local\Temp\1008092001\f905700ad6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Users\Admin\AppData\Local\Temp\1008093001\e0f5b78eff.exe"C:\Users\Admin\AppData\Local\Temp\1008093001\e0f5b78eff.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {50a7adb6-a570-47b2-a8c2-ca6f49e2647d} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" gpu6⤵PID:4012
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2452 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0af3a59d-b88e-45b1-b834-a71f158504f9} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" socket6⤵PID:3724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3012 -childID 1 -isForBrowser -prefsHandle 2956 -prefMapHandle 2892 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f682ed30-31f2-4787-bfc4-308ca8b66b58} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" tab6⤵PID:1620
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3880 -childID 2 -isForBrowser -prefsHandle 3104 -prefMapHandle 3868 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {319de526-b4f1-4ead-89da-189c36e1bec8} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" tab6⤵PID:1064
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4548 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4492 -prefMapHandle 4500 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a82042ec-5527-46c7-bbfe-94cf50028cc5} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" utility6⤵
- Checks processor information in registry
PID:5124
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4688 -childID 3 -isForBrowser -prefsHandle 5072 -prefMapHandle 5132 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bbb61b0b-5bac-4595-b240-d5c6b06167c4} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" tab6⤵PID:1424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5316 -childID 4 -isForBrowser -prefsHandle 5228 -prefMapHandle 5224 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25401ebd-9c14-4f73-adc5-6f7f5dc16806} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" tab6⤵PID:4472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 5 -isForBrowser -prefsHandle 5444 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8dd958f8-19fd-46e2-978e-2370250d349e} 4052 "\\.\pipe\gecko-crash-server-pipe.4052" tab6⤵PID:5036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008094001\c4029391e0.exe"C:\Users\Admin\AppData\Local\Temp\1008094001\c4029391e0.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5992
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1108
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5428
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4992 -ip 49921⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1956
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5004
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4672
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json.tmp
Filesize27KB
MD56c5264d3432453641398e69b45df330e
SHA1557c6900f65fad5ba6dbff45c9e6ac543b74d14d
SHA256a5d8144f0468f555c37f1e1217bb4f354bd291189af7bba695196dc3ebf41322
SHA5122a0a88f6290496aaf618df87c225daabaca9e326b152894a595ba3c317bca682df8954d07a7513cbd817db68af9b5f23c93af6847e2dfafcb95c95f8086f999a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD521df765d7b8a4b1770e459f1ae33d705
SHA1189cb12aaa6e59c7d861014d36def9b0b5e912e8
SHA25670b905c7a4f0d4f8d00740c28b6904e0ed4da8ad2cbc7bc49d045c45306bc3c4
SHA512346a152901bf0f497cc5def72c61e8517db16c75f0f2b0b4f9795615b144459262662224ee1e1e77fb2a3a6747ed04543af2d866ab0e87a5c047e6ea6c17a708
-
Filesize
4.2MB
MD5402af0c244e89244c6e899931f5a23b9
SHA14413e4e963830f4631a64830b8dc8bf3e427d53a
SHA256e4f2dd198edb21635f20639dc65bcae2b2cf6a66b9f8a37b7253dd7b353c3ef9
SHA512fdcce9f496704336b45ec255095f7dd76fa0af26cf8ab784a283d55d5b05bd94ef3d3e61bee5b9f7e20251dfaaef9834373e6ff39e21fc689551a4ae5a27f1da
-
Filesize
1.8MB
MD5c29c30bfb75bf498848c908638625e45
SHA19879e768d895a6f4fa69bbff4c4d7193321dcc9f
SHA25606a34982b9154716e14297712ecb8efb2bc9bcce381e6e4305cf2e1579bfdcd4
SHA512ada1d2345e2a0bbb3aef2916cc001094524638a38f431817eb80207215c9eb935e2f7dfee50870b90dc43af4d39a72b4640d12aaaa51c839da0c7ef076167205
-
Filesize
1.8MB
MD5e5a48f23e7b32f452f9bf2e6bf42094c
SHA14f95895d7a641793c3e603847c06ffd51fb29940
SHA25690a76e28f761c3a0580ec1b56eb241b57001091cac3d63378dec4368279103dd
SHA5123ad71818ffa0544e8c7e302c49a51b7e58b42543a0640a588e448d4d1ebb9e4b880e1869a634b7e66a2d11849eb2c68672b575f7b6386393bc02ff052293ded4
-
Filesize
901KB
MD56e6af329feb47e6d6dec9389429cfd07
SHA1dfd44cfcabd9d5ae746ad4221e55302b89002b0a
SHA256f6dc47d57da7bec7190d32e4140b861714fefc6ceac91faf1ae3d65eae141d5d
SHA512da9e894874433ae748912ad95dc0e92a9e9cb44f95755d2ba929355abd9de631fa9b4fddebd1647d655ca8c62cc7284c97a1d4de174ce47b3cd6ec5c51a5e157
-
Filesize
2.6MB
MD5737f95c4ab6db790a94058de0ae65785
SHA127e0429b7426a619bfdfe0c71e4f5c995eb82dad
SHA256b15c5a342a7300a91373426ca437580d1dc969403e9a855cf89c4876aaa3f3eb
SHA512cc57f79bc6ed4884d174ff37cc5dd64b71946c0114b5fdb1df8aac9248db9425afcd93444bfa1a925801d82caac18eec91ad6ce6eb0d2aacc5c3f77ca693d1f7
-
Filesize
1.8MB
MD5873f4ff6922f79aca237323377183153
SHA1c0e782ab9058afb71626fae94fdd996cbeda934a
SHA256bafd70cdb59a7b667840982897d95dcbb9fcf86bde1267aacc5f7b8dcdba0271
SHA5127fa1c35440711d5f2ac374678ba37b485e73e9e592ea1592268db5420b35c374595b79050ced86cbed22ffe9bfb94a5799527a0e375db37f2a186c911f1c10e8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize7KB
MD57187b43ef6750e6b3e5be400bebacc48
SHA178c7c1f0d5a4101a3600543fa152639bb31e989a
SHA2565a14213acf7b6b381a8f14094a8a8179345fde9abce8939e8c2a2e2a11efad6f
SHA512998f5a4cb77a31ad6b8bd95ebd2c5587c8fb98409c721174550677fd1b7240a986ac56cc09f4f56fd83c0e8cae8af3c6270094f5befd9a3033388df84a954787
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD529760ab0a242353127afc18a7e7e9950
SHA1095f7e76953c665473215396b5eda3370fb53cb3
SHA256a2c673ec36edf70bfcf25153d49b898213731778a11833351f562be2c641f48b
SHA51209b25bc021fb998e90ec40f53d5f56ba78a6f0c30b7e4be7d9170eaf24c9293190bef9a2cdb8466dac1ac1f1ca4c4c23c980af1b6197303d2854c02a2d209e2f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD59875cb28ec164fe7e7f154e60e8ac1fa
SHA16bdb600ec9c08cebb760c111bdc5f0343e9fe2dc
SHA256eb298dbf1226ed11d01ab35498658f71798d779ac1fd15c30fcc1c8e2dcef8a7
SHA51278da4e661483e53d1042849988f2f952a61257f9845daeb10b775bae5f2302033acd2fbe0e31275e2e4a0cc42fceb98bb14494d01d0076ea5ee322984803c7e5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5d13f6002400aee033fdbda4b2d5e9dee
SHA1161b11feab66bc22c4094daa315c3883421d09e3
SHA256f06d5995d8ff80fc974ff8d16e93342e94cde4609cab9ed254505c269f5c4733
SHA5121d30b20a4c532abaf88cb5a20aa06a9dac2808719d6e9ab9efe009e35b8e2e0fd97a87d7c5d4b9f55a01510c3919a2836e0a1b63d7676907a44b08cf213fcedb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5e1984cb178f0042fe68f741a15487310
SHA16f0774001b04d57def187c6fd91287246be053b2
SHA256434f21d18cdccdd1c68dddf3d7190dfa1c8fda75be7df6871f9b1318a6dcdb83
SHA5122d59a89a7de72020c80674f95b6600c5ca8ed80b6e86604a02c5f9c133e7a3e99a6811121800eaf897c12008c254f214f5fbd148bc72b583d687e30e1e2169fc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5466a11a2403540717e38c755dda27a7c
SHA116ad8666729f14bcb9ebd831075791688d90e062
SHA25607f8410c688feb1d4297177ec20d06f6799631f93d5f23d9f5ef028fa11833f5
SHA512255af5703111d3ee73e993d5cfff3139051d30861f1fc38ae8eb0e9ebc8bdfae48771812c9edf83f5212c7a91703dafa182804e850cf39ae1e23044cef3ff5ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\924e76ba-9bec-40bc-878a-8994d42aa991
Filesize659B
MD53a88fc9290595f7b8196520d185fc950
SHA14b6c529e12f3d8afdcf305cc237deed39cc398d1
SHA256b00c57584ebd69af5cd50d83aa988f616348bd9deb224dce06aed853c7a3ea4e
SHA51249620a0580b57d0fc17409223cf56872b162f8b879858d61989ead4d1c32cbbec01d356e021d5aaf2a543a753626e4764cd546d3d87376125d9099520c3d25ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\bd052b45-56b1-470a-8bf9-8864e0eea48b
Filesize982B
MD5fa567900c45a3b7f8e499e6cb7c2b684
SHA1ad47cd01fa18223f92b314f21dc587aad4ed91a4
SHA2566f00d0abef0dc6c7c923490ccefefa903cf4f7d94786f92083848e26291dba99
SHA51267f31cbd845bdeccd13b912e19bcb5180fba6d9bd7bc805d7398b1e7a8f16b6aa61fd376e8eff2cc01cd0771afa221c4de46be2850b4b4bc8e654ca6aecaa4c9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5a93bae26811ea6bce262bcc40ce7d8e1
SHA1748bca48f0d1b7940d3b47dd0416ddd6b8af6f9f
SHA256d6fae57efc683eda6c71752a746bd34d3c7b3979cc35db945a513679d1f966de
SHA51279100bae25b1cd1248c2f161a96960c8e20971b676a7f7d3bd349f90c3383448f6cc4d3ae9896c45b9ee94c46df697591cb4b0d488ea900f3a62959e912195fb
-
Filesize
10KB
MD5f6983ed322fbbf611af4c437545a7109
SHA1548b0c1dd185dde78ee866454b576499a043ef2c
SHA2563e056dc6f3acf759baeb9da6b0e14fbd6ccad8958158c26a4bc8fadd6be1fbcd
SHA51259a7dc7457c949070b0948b6341318689a056426e01c5994dde970a9459e3d0aefa2b55c3a625d317b7910d90dd839b894676666ba35b70a3a535d4349ae48ee
-
Filesize
15KB
MD5e6d438eec9026be961148c4437043c1e
SHA1ba88ca3d54b5cdc3d58dbf1faa64e804a85f25f5
SHA256348fe41d640313d44bef45292bf08f4f1db73891c09d9c01ef10d88406ac8b5a
SHA51202668494ca8382bbc55987ca4432bb37099d81069bb14c4e9183327008f18e9d891ed19b5abae90a734eb914ed2b111305e77f630d814bf871b56faf2fc07093
-
Filesize
10KB
MD5ee891cc0ab1eb3640450df21e4c2ad65
SHA176d8b12f0656ee3ffcde268ed66d979388bf26d4
SHA25631adf9a73c9bb3614dcb1a43c1696c5fa6bc6c841c563f610442095dc2db39a2
SHA512e69bca0f354472a647c060ad742c3b7a3dce0db01e1015e69c2cf224c52147fa20839aa2b0e945d7643d4a2edf9bd5adee739dfc5865e7b6d8a3116531a9a281
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e