Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe
Resource
win7-20240903-en
General
-
Target
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe
-
Size
1.9MB
-
MD5
97c28150bb67a2e061f53bc6a0a792d7
-
SHA1
c43425667d89e2c5a318147ae39b323f5a790af7
-
SHA256
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96
-
SHA512
ddaa1eb2b83ea25a686d6d442e583cd5a71a3204dfb71db664f2d8267519382446471be256ca314ce88fbc983bca24bd5b2e1740105f346c588a0214edf8abb4
-
SSDEEP
49152:O4/csNlzfLamxFm9gl1WeIunPf03FJYev12xeK:OCcS1R26Bt83PvUxl
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3664-66-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
f20510648c.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f20510648c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection f20510648c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f20510648c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f20510648c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f20510648c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f20510648c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
33732f0b22.exeab87ab3e42.exe52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exeskotes.exeskotes.exee2345020c9.exef20510648c.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33732f0b22.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab87ab3e42.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e2345020c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f20510648c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 3876 chrome.exe 2576 chrome.exe 1688 chrome.exe 4568 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe33732f0b22.exee2345020c9.exeskotes.exeskotes.exe52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exef20510648c.exeab87ab3e42.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33732f0b22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e2345020c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f20510648c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33732f0b22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab87ab3e42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e2345020c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f20510648c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab87ab3e42.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
33732f0b22.exe52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exeskotes.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 33732f0b22.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exe33732f0b22.exeab87ab3e42.exeskotes.exee2345020c9.exe71a44b34af.exef20510648c.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 2780 skotes.exe 3664 33732f0b22.exe 5012 ab87ab3e42.exe 2504 skotes.exe 780 e2345020c9.exe 2280 71a44b34af.exe 5256 f20510648c.exe 2372 service123.exe 3564 skotes.exe 4804 service123.exe 4824 skotes.exe 1640 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e2345020c9.exeskotes.exeskotes.exeab87ab3e42.exeskotes.exef20510648c.exeskotes.exe52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe33732f0b22.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine e2345020c9.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine ab87ab3e42.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine f20510648c.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 33732f0b22.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 2372 service123.exe 4804 service123.exe 1640 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
f20510648c.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features f20510648c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f20510648c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab87ab3e42.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008135001\\ab87ab3e42.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e2345020c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008136001\\e2345020c9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\71a44b34af.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008137001\\71a44b34af.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f20510648c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008138001\\f20510648c.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008137001\71a44b34af.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exeskotes.exe33732f0b22.exeab87ab3e42.exeskotes.exee2345020c9.exef20510648c.exeskotes.exeskotes.exepid process 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe 2780 skotes.exe 3664 33732f0b22.exe 5012 ab87ab3e42.exe 2504 skotes.exe 780 e2345020c9.exe 5256 f20510648c.exe 3564 skotes.exe 4824 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exedescription ioc process File created C:\Windows\Tasks\skotes.job 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5228 3664 WerFault.exe 33732f0b22.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
71a44b34af.exetaskkill.exetaskkill.exetaskkill.exeab87ab3e42.exee2345020c9.exetaskkill.exef20510648c.exeschtasks.exe33732f0b22.exetaskkill.exe52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exeskotes.exeservice123.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71a44b34af.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab87ab3e42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2345020c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f20510648c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33732f0b22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
33732f0b22.exefirefox.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 33732f0b22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 33732f0b22.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1148 taskkill.exe 4908 taskkill.exe 4568 taskkill.exe 5024 taskkill.exe 4808 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exeskotes.exe33732f0b22.exeab87ab3e42.exeskotes.exee2345020c9.exe71a44b34af.exechrome.exef20510648c.exeskotes.exeskotes.exepid process 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe 2780 skotes.exe 2780 skotes.exe 3664 33732f0b22.exe 3664 33732f0b22.exe 5012 ab87ab3e42.exe 5012 ab87ab3e42.exe 2504 skotes.exe 2504 skotes.exe 780 e2345020c9.exe 780 e2345020c9.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 3876 chrome.exe 3876 chrome.exe 5256 f20510648c.exe 5256 f20510648c.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 5256 f20510648c.exe 5256 f20510648c.exe 5256 f20510648c.exe 3564 skotes.exe 3564 skotes.exe 4824 skotes.exe 4824 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exechrome.exefirefox.exef20510648c.exedescription pid process Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 4568 taskkill.exe Token: SeDebugPrivilege 5024 taskkill.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeDebugPrivilege 4676 firefox.exe Token: SeDebugPrivilege 4676 firefox.exe Token: SeShutdownPrivilege 3876 chrome.exe Token: SeCreatePagefilePrivilege 3876 chrome.exe Token: SeDebugPrivilege 5256 f20510648c.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe71a44b34af.exechrome.exefirefox.exepid process 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 2280 71a44b34af.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 3876 chrome.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
71a44b34af.exefirefox.exepid process 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 4676 firefox.exe 2280 71a44b34af.exe 2280 71a44b34af.exe 2280 71a44b34af.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4676 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exeskotes.exe71a44b34af.exefirefox.exe33732f0b22.exechrome.exefirefox.exedescription pid process target process PID 1800 wrote to memory of 2780 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe skotes.exe PID 1800 wrote to memory of 2780 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe skotes.exe PID 1800 wrote to memory of 2780 1800 52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe skotes.exe PID 2780 wrote to memory of 3664 2780 skotes.exe 33732f0b22.exe PID 2780 wrote to memory of 3664 2780 skotes.exe 33732f0b22.exe PID 2780 wrote to memory of 3664 2780 skotes.exe 33732f0b22.exe PID 2780 wrote to memory of 5012 2780 skotes.exe ab87ab3e42.exe PID 2780 wrote to memory of 5012 2780 skotes.exe ab87ab3e42.exe PID 2780 wrote to memory of 5012 2780 skotes.exe ab87ab3e42.exe PID 2780 wrote to memory of 780 2780 skotes.exe e2345020c9.exe PID 2780 wrote to memory of 780 2780 skotes.exe e2345020c9.exe PID 2780 wrote to memory of 780 2780 skotes.exe e2345020c9.exe PID 2780 wrote to memory of 2280 2780 skotes.exe 71a44b34af.exe PID 2780 wrote to memory of 2280 2780 skotes.exe 71a44b34af.exe PID 2780 wrote to memory of 2280 2780 skotes.exe 71a44b34af.exe PID 2280 wrote to memory of 1148 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 1148 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 1148 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4908 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4908 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4908 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4568 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4568 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4568 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 5024 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 5024 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 5024 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4808 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4808 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 4808 2280 71a44b34af.exe taskkill.exe PID 2280 wrote to memory of 1768 2280 71a44b34af.exe firefox.exe PID 2280 wrote to memory of 1768 2280 71a44b34af.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 1768 wrote to memory of 4676 1768 firefox.exe firefox.exe PID 3664 wrote to memory of 3876 3664 33732f0b22.exe chrome.exe PID 3664 wrote to memory of 3876 3664 33732f0b22.exe chrome.exe PID 3876 wrote to memory of 4964 3876 chrome.exe chrome.exe PID 3876 wrote to memory of 4964 3876 chrome.exe chrome.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe PID 4676 wrote to memory of 1196 4676 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe"C:\Users\Admin\AppData\Local\Temp\52c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\1008134001\33732f0b22.exe"C:\Users\Admin\AppData\Local\Temp\1008134001\33732f0b22.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3664 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3876 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xdc,0x104,0x7fffdfddcc40,0x7fffdfddcc4c,0x7fffdfddcc585⤵PID:4964
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,16042670278187062826,2999683537038578273,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1916 /prefetch:25⤵PID:4460
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2144,i,16042670278187062826,2999683537038578273,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2204 /prefetch:35⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2260,i,16042670278187062826,2999683537038578273,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:85⤵PID:3752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3092,i,16042670278187062826,2999683537038578273,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3112 /prefetch:15⤵
- Uses browser remote debugging
PID:1688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3120,i,16042670278187062826,2999683537038578273,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3152 /prefetch:15⤵
- Uses browser remote debugging
PID:2576
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4484,i,16042670278187062826,2999683537038578273,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4428 /prefetch:15⤵
- Uses browser remote debugging
PID:4568
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2372
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:6040
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3664 -s 13084⤵
- Program crash
PID:5228
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008135001\ab87ab3e42.exe"C:\Users\Admin\AppData\Local\Temp\1008135001\ab87ab3e42.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Users\Admin\AppData\Local\Temp\1008136001\e2345020c9.exe"C:\Users\Admin\AppData\Local\Temp\1008136001\e2345020c9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:780
-
-
C:\Users\Admin\AppData\Local\Temp\1008137001\71a44b34af.exe"C:\Users\Admin\AppData\Local\Temp\1008137001\71a44b34af.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77a63021-40d8-4e7c-b4a3-edc2329070c9} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" gpu6⤵PID:1196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2440 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f0980f12-b675-4b08-8e18-732a02674d56} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" socket6⤵PID:208
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3212 -childID 1 -isForBrowser -prefsHandle 3052 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {721c5719-1839-42ec-94fc-98f74d8e872d} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" tab6⤵PID:4284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3580 -childID 2 -isForBrowser -prefsHandle 3636 -prefMapHandle 3484 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8aff847-38ac-43d0-b9fe-405d6710d7e1} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" tab6⤵PID:4900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4336 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4328 -prefMapHandle 4324 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a04293c7-a9da-4ace-a7a1-0eeede62d3af} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" utility6⤵
- Checks processor information in registry
PID:5916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5396 -childID 3 -isForBrowser -prefsHandle 5356 -prefMapHandle 5344 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1c2dc52-9777-42a0-897c-7ac8578d74cb} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" tab6⤵PID:5784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5412 -childID 4 -isForBrowser -prefsHandle 5552 -prefMapHandle 5556 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fcbd19a6-dbc4-4c3c-a16c-69414b989f13} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" tab6⤵PID:5148
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5724 -childID 5 -isForBrowser -prefsHandle 5732 -prefMapHandle 5736 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 896 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4fe33d45-5098-4b60-a5d9-2ada8dd8f9d4} 4676 "\\.\pipe\gecko-crash-server-pipe.4676" tab6⤵PID:5160
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008138001\f20510648c.exe"C:\Users\Admin\AppData\Local\Temp\1008138001\f20510648c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5256
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2504
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4580
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3664 -ip 36641⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4804
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD54ccb0f07d6d106d0f5a67373277ae2de
SHA140e083d9a44f811b7e8a2286e7af85773a8f8a27
SHA25634bb223b277916440d575c1268b2e522b68465f97bec95ac4e84a6879a979210
SHA512002a7fa928d9d0213812a482b1a5aa31a4305d0e0311e80b666632337c05e137a022e612b096082af0974c3bcd8d4233373850ebb134ffa98f3bd9fbae116913
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD53998234bd328c540a6f878d462edd6db
SHA1bcaa53aaf4cf27c62077aa1453de5ba6a0e220b0
SHA256d1db413b1fcd9776bb9ee49c47649dad15d27fdd0a24d436aae759318b2a4ff1
SHA51261681e9cc48f3a11da22c71e7089471981023ed57a0fe684cb9588411375ada7fac01eff40c4404c593aab7667fe512f54d7011440ab9a933da2cb8eacfe0506
-
Filesize
4.2MB
MD5455d3e46c7b97c0e6f1ed1072e8ec7b1
SHA1fa1bc295a7f78dce0c28bf9c24a7fe16e8b6bc55
SHA256f5c02d06937793096e56f2acd5b302fe7cdcdfbdf943c9ee269b50037753969f
SHA512ef0b87b68dc6bb80f41d64c94b3e0d1170f9e9e02eaa191748e12bf32c8efe63d94063667a4cc6ec3c72094288b873b9fcb109b1885551111f0e6b59fc01181d
-
Filesize
1.8MB
MD55356c7fadea27060e683ea467efbc21b
SHA1da9fc2af4e66941e0c0c4b3a93e911a5221032e9
SHA256c334c9de728d4fb29fcab3a7b6774bcdf99f20e42dd527ac766385165768fe39
SHA512a15a6732523fea27f27a487863a4997c2137a7e3b234b4c012adafeb674f8ccefeb47f977d88b37fadcec3f3abe5308854537cf210ea1c2615edb8e2c14c6600
-
Filesize
1.7MB
MD5405dcfb77eb969d356061f551b1d3a1f
SHA128aabbccb4b5f095e4046fbcb5148b9813de756b
SHA256d23c929cadf5890a5afadd25b36e9d73fa8328c0fe7d750578cf59fba2cf72e0
SHA512bb8a4f340a2e3b8b8fe8913da46cf2f7e1887128971ecb94832292f66ca7f00af91d6b1384957788fb11e2d487942a80c1c77515906dba22908627fa20ac0a41
-
Filesize
901KB
MD5e11effb82894fc710818be4c9d212e96
SHA15f51380ef63a2dc38f549aa668d7feb5b6ae61fd
SHA256e5c33b4ba7e111170c2aa54f3eaf726aefbdd0426e2502b440c4a3de8d94aee1
SHA512d5cdb95b126340e827399de8c34cc9222cd18e68345ac290214bc893fe3e75efe8eb09096add35c58bb32dae20b7d13bbe35854b292dcd511a784ca2fabb3454
-
Filesize
2.6MB
MD5fceaf512d5a53cbdc093149c76b6ef99
SHA129776dad9da781817c54d5ab6d3add547382937e
SHA256ba19021aa240c1d2da39065aef88728c164ca358d85eec9f26aafb59e4f9386a
SHA512b799433579da32515553d7bfea61572cee9616cb08a08b6f5eac45b76515db8540454970b11d23482151cba2dba2d0e7b0dc121efd6c55dce4ea9e2a11670a6f
-
Filesize
1.9MB
MD597c28150bb67a2e061f53bc6a0a792d7
SHA1c43425667d89e2c5a318147ae39b323f5a790af7
SHA25652c6557261d03cd1c30f780d551d12bb94a05a11126a4c4d2f285f3c5463ef96
SHA512ddaa1eb2b83ea25a686d6d442e583cd5a71a3204dfb71db664f2d8267519382446471be256ca314ce88fbc983bca24bd5b2e1740105f346c588a0214edf8abb4
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD5a6a44c34f707d1c2c0c902dddd185c13
SHA1dd9374dcbaea7115e34a7e38b5af6292b7a0baa6
SHA256c857e7707bd885f6fa71a6ace70b8e8dc7198237c55ca02683bb4261ea10881f
SHA512e66d987bba35844f511e46d88df23986c6041140a81f6d4396199489a9b6d2f52b615176698502b7db65e7ec5d4b145aec69414cc3329c1a4ca3340f33997be7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD5a9d89fa19a1036b3abf6821a2386506c
SHA1f1fc63d4d6b6bcf2240114fe15bacf6a0de2045d
SHA256bd872d161996ab18038958a3c8bfdc8e49c6c55a764b2eea3dd54a30d4b34047
SHA5127d532387805b5a2898b6a2e0d512d71ac5f8c43d0892f3ccc94aa5126c1d4510e811d6f44be73ded9653a84ad6590c26eeb5d027980b7c81b659efe7db6664aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5a1acb34982adfcc7cedfe31b9d1338f5
SHA1cd58ce3de366f67d3096f1db8b294c13482b8dff
SHA2560c31f38908550f0eb0d4d1365e24dfd428cdb3ddfc6e2841b9479c902ae2cd3d
SHA5128e6fca6ab3d911b81b1ea92c05246435e6f11c1bfeeb5283f77518ff3e1b6cc81a307020038df6f70d1d93ce58771c12b9b22dca2ef1d13489aaed46e1d4a5ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD55c708a615e685293583942a5f89f432c
SHA1a674c943441a18902993e505ef5fb9ec707ee853
SHA2563e9951f1e06c887b5c87031b68f0b204f06068af7253a8a9c4d0695273e6c12c
SHA5129b1f16ef3cc60b3942966f2c0efa4e8fcb269e32b95246bf11aea08da3fce1a40405331021d1b2d4917af59da3ba1693df581cf9b02920c546e8bebd852d9333
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD54c941d71455c76e0c18c10dd6fc32459
SHA110e618ed50ecbb34b13973e9803481213bd1a72f
SHA2563ed2ae02b4b822f9ab828a92fb653626084abb1ed802c551fee8d6cded29da75
SHA512bba31c95fcd6fc275d0b1d44b27d0191f461a6d7ed46acd24fa467dd23d7638b22e980e972493351937c7bac0fe271ba9bfb9eb2e86f9a34a8fd1b1b5af7277b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ea18920af10fb09424e9d57a14bd8c87
SHA199da72bdc536383e6bd0c02b1ca46fe6124e1807
SHA256b54c2ab8de3509536b88e8f8f7d060bb24f590ffe6b232ec69bd086786c50ada
SHA512fb69a7f9648ad020f6ab5d9856d8a32f06e24af11dd6cd3419f1798af8344763daf750d69f458c5bbca8f8e33585a1d7afb49b60f3fa067b1162308571441045
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\8f43b1c8-3bc5-44cd-8422-86857a02f70e
Filesize26KB
MD50d1e40cf3ad2289c9303b39b2834244a
SHA1d907b3a99b9653b6969c42511086a7da2a7236c4
SHA256d48a806499e03110ee211462fe4d56f2f64ac42a10dbbdb9f8ecff55f23e1348
SHA51268dec221a118146ab2913ae5cdc8f41ab752bfccc31178e864785c6251789a85fe869ca9bdd9be37e38253dbee276407e49fe1cc58b0d584a8507bcf92e4bcf5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\c46137c3-cae3-4001-975e-7ede418498b4
Filesize671B
MD5e32c00aac8558b8f31d1b01d35c51b1f
SHA13493705921e8b67fc6f2236107b382e42f762109
SHA256c74aced12af336f559fb311a5b588f93027d4f69e7b8b1af1726d89afa30e388
SHA51280b6a81aafcc54444754475993c51220a89b266e677dd85648eb797e985414f09df6ac5ea24f3bd22260ab4338593a64fdd18aedb20e3e7be647231c456eb02c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\f8a70e6c-4144-4c3e-95b8-5626b11a4905
Filesize982B
MD5bf6b121699bd0a96aba3a5f11b799140
SHA190ed4ead2a3f300358b8203918858364911d30d1
SHA2568b1662ffda04197c5bbe7fc7b92fb9e86a13d74bbfc9de0ea24aa24404cab0a0
SHA51269741dfc69f95fe464ad8098cbacec2344e65824d21c0ff1c2823e6360d5e4751fcdf7dacf4a122ea7b4fc9d6605ded124c07ca5b1aaaad899adc35966e86192
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5fbfe81505658c2af1afb1237ca7f1d31
SHA17e0dbbe3eea365d8fd4582f8a82cff8bb37d53e1
SHA2568edfbc5d39cf5eddfb7f38a0ce3d84f0b6113d1c3ba8c40aed3889887158677b
SHA512a3944110d19382e1c5216afa8005fe945b2ddbad49081d268db48a67a899287f175c261dc01984835c258b21bb6b1f8ca5e6675f5e46caaa7d4a6d6ddf849768
-
Filesize
11KB
MD5d9ddd9db0ab9d6dc67202917ccd0640f
SHA1b9c6cc402f3cd5457d396e5a38d79f7f63048861
SHA256ba0571576ac23c30e712ee0addbed70cec1dcead34b980ca0f322af687664685
SHA512ec28cb517309dffcee7aab3fbd2e55e8042c398281a8b695974db76314c8ab3d8b8d3753e871b31d860c978a1337a0b2ec9ca5ccec1577762a943d56e54a10c1
-
Filesize
15KB
MD5e11699d5e38853af925cf99b58501a85
SHA10ed89a84f933455707fed3541175cba152be009b
SHA256f2b2c14d930d8e859b41057bec9273a0491267e3869184ad5b5701f04e83b564
SHA5125639799199dd63cc9b77c76d5f45ca734fbf6b08170feaafa1abdf9ad23ba8c0fc05c9c97ada49782c481330113641896cc78ab9d304629060f69974368c62b4
-
Filesize
11KB
MD5f579fb3b71ee7b8e2f557b5bd1e98930
SHA1a32a7e0ecbcc230dbb724daab8fda5cb20269cd3
SHA2564ac64496ba91005d112c5e9eda341e4240414d163744d55d6056144dabb68406
SHA512d4351d743d6b23e389024cc2771da2dab7b3b9d1c539ef7dd3da0ab1735b61553c84875f1c36e4a10d30ae355f6b7a2b92374613902dd46eca600aa02a71f5b1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e