Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 14:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
1daa3a0aa5ed7e06b400a47309ba5003
-
SHA1
8d475fd4be28ee701dbe5e2fe489fe9e9b3e826d
-
SHA256
c3d0427b8bc9d084ac65b881ec50f55be52650f60850ac05010ccc8d56e3d1cb
-
SHA512
bc671cd250579413e693d2a61c2873a776a7c39125addd78b7a39a268c508fb638cd7c552faabd3ac9a53baf4b97086173af09264dd68e2f5a7516b55a3f2ed8
-
SSDEEP
49152:PMGDMQEgEDs8SLI5GQ3+l1cxRGPfyJgSuOB3X:PMLZuIgQuxpSbF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
meduza
109.107.181.162
-
anti_dbg
true
-
anti_vm
true
-
build_name
439
-
extensions
none
-
grabber_max_size
1.048576e+06
-
links
none
-
port
15666
-
self_destruct
true
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Meduza Stealer payload 41 IoCs
Processes:
resource yara_rule behavioral2/memory/2856-43-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-50-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-54-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-60-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-57-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-62-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-56-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-53-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-49-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-44-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-41-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-48-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-47-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-72-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-71-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-77-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-82-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-81-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-76-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-75-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-78-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-83-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-119-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-114-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-112-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-106-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-105-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-99-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-96-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-94-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-93-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-90-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-88-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-87-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-84-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-123-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-117-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-111-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-100-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-185-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza behavioral2/memory/2856-193-0x0000000140000000-0x00000001401FA000-memory.dmp family_meduza -
Meduza family
-
Processes:
fda68df5e7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" fda68df5e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" fda68df5e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" fda68df5e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" fda68df5e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" fda68df5e7.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection fda68df5e7.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
fda68df5e7.exe7dfcc52d10.exeskotes.exeskotes.exefile.exeskotes.exe612d6f5c3f.exe16dfcf7db0.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fda68df5e7.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7dfcc52d10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 612d6f5c3f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 16dfcf7db0.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 6012 chrome.exe 6016 chrome.exe 4164 chrome.exe 5584 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
file.exe612d6f5c3f.exefda68df5e7.exe7dfcc52d10.exeskotes.exeskotes.exe16dfcf7db0.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 612d6f5c3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fda68df5e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7dfcc52d10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 612d6f5c3f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 16dfcf7db0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 16dfcf7db0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fda68df5e7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7dfcc52d10.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exeskotes.exeCrypt_Medusa.exe7dfcc52d10.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation Crypt_Medusa.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 7dfcc52d10.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exeCrypt_Medusa.exeCrypt_Medusa.exe612d6f5c3f.exe16dfcf7db0.exeeb494a0f33.exefda68df5e7.exe7dfcc52d10.exeskotes.exeskotes.exeservice123.exepid process 224 skotes.exe 960 Crypt_Medusa.exe 2856 Crypt_Medusa.exe 4124 612d6f5c3f.exe 4584 16dfcf7db0.exe 3488 eb494a0f33.exe 5388 fda68df5e7.exe 5220 7dfcc52d10.exe 5888 skotes.exe 4724 skotes.exe 2876 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
612d6f5c3f.exe16dfcf7db0.exefda68df5e7.exe7dfcc52d10.exeskotes.exeskotes.exefile.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 612d6f5c3f.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 16dfcf7db0.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine fda68df5e7.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 7dfcc52d10.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Loads dropped DLL 1 IoCs
Processes:
service123.exepid process 2876 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
fda68df5e7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features fda68df5e7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" fda68df5e7.exe -
Accesses Microsoft Outlook profiles 1 TTPs 5 IoCs
Processes:
Crypt_Medusa.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\12.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\eb494a0f33.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008210001\\eb494a0f33.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fda68df5e7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008211001\\fda68df5e7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\612d6f5c3f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008208001\\612d6f5c3f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\16dfcf7db0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008209001\\16dfcf7db0.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 20 api.ipify.org 22 api.ipify.org -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008210001\eb494a0f33.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
file.exeskotes.exe612d6f5c3f.exe16dfcf7db0.exefda68df5e7.exe7dfcc52d10.exeskotes.exeskotes.exepid process 2016 file.exe 224 skotes.exe 4124 612d6f5c3f.exe 4584 16dfcf7db0.exe 5388 fda68df5e7.exe 5220 7dfcc52d10.exe 5888 skotes.exe 4724 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Crypt_Medusa.exedescription pid process target process PID 960 set thread context of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5372 5220 WerFault.exe 7dfcc52d10.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
eb494a0f33.exetaskkill.exetaskkill.exe7dfcc52d10.exefile.exeskotes.exeservice123.exe612d6f5c3f.exe16dfcf7db0.exetaskkill.exetaskkill.exeschtasks.exetaskkill.exefda68df5e7.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb494a0f33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7dfcc52d10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 612d6f5c3f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16dfcf7db0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fda68df5e7.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
cmd.exePING.EXEpid process 2752 cmd.exe 2148 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe7dfcc52d10.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 7dfcc52d10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 7dfcc52d10.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1148 taskkill.exe 3500 taskkill.exe 4028 taskkill.exe 988 taskkill.exe 1696 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
file.exeskotes.exeCrypt_Medusa.exe612d6f5c3f.exe16dfcf7db0.exeeb494a0f33.exefda68df5e7.exe7dfcc52d10.exeskotes.exechrome.exeskotes.exepid process 2016 file.exe 2016 file.exe 224 skotes.exe 224 skotes.exe 2856 Crypt_Medusa.exe 2856 Crypt_Medusa.exe 4124 612d6f5c3f.exe 4124 612d6f5c3f.exe 4584 16dfcf7db0.exe 4584 16dfcf7db0.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 5388 fda68df5e7.exe 5388 fda68df5e7.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 5388 fda68df5e7.exe 5388 fda68df5e7.exe 5388 fda68df5e7.exe 5220 7dfcc52d10.exe 5220 7dfcc52d10.exe 5888 skotes.exe 5888 skotes.exe 5584 chrome.exe 5584 chrome.exe 4724 skotes.exe 4724 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
Processes:
Crypt_Medusa.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exefda68df5e7.exechrome.exedescription pid process Token: SeDebugPrivilege 2856 Crypt_Medusa.exe Token: SeImpersonatePrivilege 2856 Crypt_Medusa.exe Token: SeDebugPrivilege 988 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 1148 taskkill.exe Token: SeDebugPrivilege 3500 taskkill.exe Token: SeDebugPrivilege 4028 taskkill.exe Token: SeDebugPrivilege 408 firefox.exe Token: SeDebugPrivilege 408 firefox.exe Token: SeDebugPrivilege 5388 fda68df5e7.exe Token: SeShutdownPrivilege 5584 chrome.exe Token: SeCreatePagefilePrivilege 5584 chrome.exe Token: SeShutdownPrivilege 5584 chrome.exe Token: SeCreatePagefilePrivilege 5584 chrome.exe Token: SeDebugPrivilege 408 firefox.exe Token: SeDebugPrivilege 408 firefox.exe Token: SeDebugPrivilege 408 firefox.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
file.exeeb494a0f33.exefirefox.exechrome.exepid process 2016 file.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 3488 eb494a0f33.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe 5584 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
eb494a0f33.exefirefox.exepid process 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 3488 eb494a0f33.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 408 firefox.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe 3488 eb494a0f33.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 408 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exeCrypt_Medusa.exeeb494a0f33.exefirefox.exefirefox.exedescription pid process target process PID 2016 wrote to memory of 224 2016 file.exe skotes.exe PID 2016 wrote to memory of 224 2016 file.exe skotes.exe PID 2016 wrote to memory of 224 2016 file.exe skotes.exe PID 224 wrote to memory of 960 224 skotes.exe Crypt_Medusa.exe PID 224 wrote to memory of 960 224 skotes.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 960 wrote to memory of 2856 960 Crypt_Medusa.exe Crypt_Medusa.exe PID 224 wrote to memory of 4124 224 skotes.exe 612d6f5c3f.exe PID 224 wrote to memory of 4124 224 skotes.exe 612d6f5c3f.exe PID 224 wrote to memory of 4124 224 skotes.exe 612d6f5c3f.exe PID 224 wrote to memory of 4584 224 skotes.exe 16dfcf7db0.exe PID 224 wrote to memory of 4584 224 skotes.exe 16dfcf7db0.exe PID 224 wrote to memory of 4584 224 skotes.exe 16dfcf7db0.exe PID 224 wrote to memory of 3488 224 skotes.exe eb494a0f33.exe PID 224 wrote to memory of 3488 224 skotes.exe eb494a0f33.exe PID 224 wrote to memory of 3488 224 skotes.exe eb494a0f33.exe PID 3488 wrote to memory of 988 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 988 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 988 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 1696 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 1696 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 1696 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 1148 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 1148 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 1148 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 3500 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 3500 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 3500 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 4028 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 4028 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 4028 3488 eb494a0f33.exe taskkill.exe PID 3488 wrote to memory of 2348 3488 eb494a0f33.exe firefox.exe PID 3488 wrote to memory of 2348 3488 eb494a0f33.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 2348 wrote to memory of 408 2348 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe PID 408 wrote to memory of 3048 408 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
Processes:
Crypt_Medusa.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe -
outlook_win_path 1 IoCs
Processes:
Crypt_Medusa.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 Crypt_Medusa.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2856 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\1008207001\Crypt_Medusa.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2752 -
C:\Windows\system32\PING.EXEping 1.1.1.1 -n 1 -w 30006⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2148
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008208001\612d6f5c3f.exe"C:\Users\Admin\AppData\Local\Temp\1008208001\612d6f5c3f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\1008209001\16dfcf7db0.exe"C:\Users\Admin\AppData\Local\Temp\1008209001\16dfcf7db0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\1008210001\eb494a0f33.exe"C:\Users\Admin\AppData\Local\Temp\1008210001\eb494a0f33.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4028
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2028 -parentBuildID 20240401114208 -prefsHandle 1956 -prefMapHandle 1784 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {07d4c88e-f63f-434c-8b75-4d2cb5e280b0} 408 "\\.\pipe\gecko-crash-server-pipe.408" gpu6⤵PID:3048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2448 -parentBuildID 20240401114208 -prefsHandle 2440 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e03edae1-5185-413f-8921-247511eeace7} 408 "\\.\pipe\gecko-crash-server-pipe.408" socket6⤵PID:5068
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2960 -childID 1 -isForBrowser -prefsHandle 2848 -prefMapHandle 2860 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {08d00ac9-f9b9-498d-b263-2ebf236bc4ad} 408 "\\.\pipe\gecko-crash-server-pipe.408" tab6⤵PID:2868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4044 -childID 2 -isForBrowser -prefsHandle 4008 -prefMapHandle 4020 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6586339f-41e6-4649-9ca7-38803a7bf5e3} 408 "\\.\pipe\gecko-crash-server-pipe.408" tab6⤵PID:3104
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4772 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4808 -prefMapHandle 4804 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {91c46cb1-6ee8-4e2a-b925-60da06155257} 408 "\\.\pipe\gecko-crash-server-pipe.408" utility6⤵
- Checks processor information in registry
PID:940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5232 -childID 3 -isForBrowser -prefsHandle 5240 -prefMapHandle 5244 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0184c7bd-10ef-4e43-9eef-7a116997d68b} 408 "\\.\pipe\gecko-crash-server-pipe.408" tab6⤵PID:5900
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5424 -childID 4 -isForBrowser -prefsHandle 5432 -prefMapHandle 5436 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ce271c9-f3ff-4f82-8669-82a1153f7c71} 408 "\\.\pipe\gecko-crash-server-pipe.408" tab6⤵PID:5912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 5 -isForBrowser -prefsHandle 5628 -prefMapHandle 5636 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 984 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {36905e13-9259-40b4-9921-3826893da077} 408 "\\.\pipe\gecko-crash-server-pipe.408" tab6⤵PID:5924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008211001\fda68df5e7.exe"C:\Users\Admin\AppData\Local\Temp\1008211001\fda68df5e7.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5388
-
-
C:\Users\Admin\AppData\Local\Temp\1008212001\7dfcc52d10.exe"C:\Users\Admin\AppData\Local\Temp\1008212001\7dfcc52d10.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5220 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5584 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffa90a9cc40,0x7ffa90a9cc4c,0x7ffa90a9cc585⤵PID:2468
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1988,i,8805620219109729227,8786058463012033396,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1984 /prefetch:25⤵PID:4324
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=388,i,8805620219109729227,8786058463012033396,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1752 /prefetch:35⤵PID:4812
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2300,i,8805620219109729227,8786058463012033396,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2308 /prefetch:85⤵PID:5544
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,8805620219109729227,8786058463012033396,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:6012
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3200,i,8805620219109729227,8786058463012033396,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:6016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,8805620219109729227,8786058463012033396,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:15⤵
- Uses browser remote debugging
PID:4164
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2876
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4120
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5220 -s 18124⤵
- Program crash
PID:5372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5888
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 5220 -ip 52201⤵PID:5176
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
8Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize20KB
MD50edd554516a4772d835dff8784e5680d
SHA155d0d3b7e47e9b0941609548aaaa8e1b823d1dbf
SHA2568e75bb79df9faa3ecb95848b99282d09a72b91972431e7f520932d8e0537bd14
SHA51233a7aa1b6b4cf8514b3b1f85e9d2ee3e0dbeeff9e57b531d26a5ddd4219465b46ac2bd702e72e9c5984c5721dad74986773632a7c5b6dcb41f280a0ff99912f9
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD549d230183e177c2594598fdd79801b78
SHA146b0c044c3126a241d2e16e1ee3da4b89e0793bd
SHA256c7b05e004f8b4d41b96daec73693374a1e0f7549cc028932faa270295f871180
SHA512d3e7e151e57684da8846b0b605abe977b66b92f7608131d7b28f2b44ba1fc9a60c0277d65bfe84e4912873519ae1440a01ac99e3e1d09c5324df0efc37ce0e20
-
Filesize
4.1MB
MD53f6b461548bdf92e28da68177b1c6e5c
SHA16f8d46823ac5710ba74f5e9f90429dd64ae792f3
SHA256cc332b2b190d6bed3bfccf6f7b878a2065cf70babd1cc79a65b7adeadf130323
SHA5122a8c3421b7c5f718077efe03970de7e716eceffeea39df6b5e4cdf6d8468b896a60b6842d8d174cdc96e58a372b3cbfd07fedcb308f9348a6860e441c72bb88f
-
Filesize
1.8MB
MD5a86f2c1f9149bb3b144a8bb9dae81fe1
SHA1d92e5093e65fe71cab7d620358b61e682563e5a3
SHA2565c0f9637fb888a34dfde5a50476a9ec70abdd40d0aa54c1f0d7580f66abb0f20
SHA512efa9c4a74330435932459e45c01ae51136fa2a27d6d8e69b8f6a6737088c14853f1de056ab7d52ade5e3e601367a29c6e63b3abef0cc7b5f1a98cbaa82900945
-
Filesize
1.7MB
MD5bc7e15f0d547a97f33b7084eb8bb6e35
SHA183ee297f1a2f1651c6596c5349614ea27e4643d5
SHA256bee50744a16bd59e87b06e58043e3efd7bd2d3fb31f25e4481a9ea498e181194
SHA512e02e938300749d0c12b14a7b58c7cbd5bb0ab24680313bdcce95aef40403dcebfd10e1ce9f27088e6540fb21e5df70e09b296eeca832e165c74f4cf72b08b1ae
-
Filesize
901KB
MD5b0895a0731c64e8b38c574eb8309b613
SHA13ea5cf134fe2eeac85d6e0d270e020e0d70673af
SHA256b98202d8039c3e44098b3d63a000bd426afa2d01ad5365b4c4a36ee936f97bba
SHA512980d03ffc4763b4c4b2941a66ef43f0f5dbb11dcb55eae172d0e2074af41504a718d849c3d696fcfaf0b3c74c62c59dc661394349f02f78e365fd073c0632dd8
-
Filesize
2.7MB
MD551dad23c32335b9cf2517bd6d2b8602e
SHA10262f39a2b1562fa0eaf497490a712eed240fcb1
SHA256aa4b16bcda60809267bffc7edbfd75d29ba563d9f341cc57994d2676ada69156
SHA512bb2e9854819b47cf2360fba54f40bba9b883cdc04adf4d4f4ede0cca0cb40191d86c2ef56605b035101d2424a9ad2b0952ca80a6b5bc5d0ecbb7a910e1cbca72
-
Filesize
4.2MB
MD5b759516b5ee0d73ed0870c1be43fb479
SHA134533e5ca737f48d55c73ba5cb939f39089c04c2
SHA25691180f943fef39f7177bbd1c1d8cf225fe93c0264dee172ebc7c96e69592373f
SHA512e911a8ca629d58942da1b2f8a85552b7f65814e071fb3105049e61eeef75fe4b545adbd95e01d58510b48f2abe83a630d438c8ea95abfd0e1866de330f27bc26
-
Filesize
1.8MB
MD51daa3a0aa5ed7e06b400a47309ba5003
SHA18d475fd4be28ee701dbe5e2fe489fe9e9b3e826d
SHA256c3d0427b8bc9d084ac65b881ec50f55be52650f60850ac05010ccc8d56e3d1cb
SHA512bc671cd250579413e693d2a61c2873a776a7c39125addd78b7a39a268c508fb638cd7c552faabd3ac9a53baf4b97086173af09264dd68e2f5a7516b55a3f2ed8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD5e2afdbd5a65c6634ed98c5c2d7a8254c
SHA1dd0b8c414dd0ae2a0e22fa1079336476966890d2
SHA2560beb14aecd1a65343f940c12379a686fc808f9ea9fc95ff95e9ab19f3ec4a0a5
SHA512a54df63ae2c0a54e5f31b8e87c69da3f591de02b0fe340ac7f2b11f2f80c628b7f3c141dd0b8cd31b56074600b81846c5e99c641b541938f8dbb97ebb34950d7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD54c176e648ec54e31c8531ae423c92916
SHA1c10cfb00dfaec2dbe7b2090c70299f0db1491c29
SHA25624e00ba3cec7ed652ec59b9f2123f4e8919b517efe734710ffcbdc0225e81f45
SHA512f17b645a8b2a88949ceedb0671cc618b85b818163635b76f879178959b80d39864517e5f7fd314da0b512975c05e636df2068e1760f7856775fc0aaaee7bbfba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD519dce2682a6716ab7d31fe6673f97018
SHA13584132dfd7fb242c903d5682ee972a835d0cf32
SHA256a68e29f178605c7e6e8bb4ba6f543aeb898bfaf69e805528b286680313f2dc3e
SHA512f03c311e40b4ff66fc09c74adec24f2cb8510275f3b243923934f86901f431a80496abd31e50d10ce96eca1dc4eda7c8a90fb43ad88dfa1f061b3a44bed0c371
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD526ccdf34ce775447138ca549ad1e3f49
SHA110f39b3ec1c7ee8da38fbafa7f9d79e809165ffb
SHA25655fd75856c3101a6bbcd67b0be4749519448864718a830db75f0ae9cd48a0205
SHA512765f3459d81091c34310066ed95b3cc1dc7ecd34ee8119831fbbfb64f74c9008abf3b159812e69dbaac142601a8e1defa8676e351e9d32a56db7420fc59cc6ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\1e3621df-a5c0-419e-8e24-81b99becbb32
Filesize26KB
MD5c83626d1a4b90f76fa89cf007aad6db6
SHA11af4a70217429a7cf558dbfd12ad504b41d616e5
SHA256b7d3727411d9f3b4f151a2765be349cb35f21a7554cf11ebc6b6b3bbac0a7672
SHA5129c465cfdc22896f13b0d9b624e36d0b2909e267f2e791a8a90eb5cb5252d40a6764a555f480b0770e08a2c367b47e9889bb5b9d5bca6c561214809a2489cd104
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\a0c1de63-9752-40d0-a8c5-d545d2091551
Filesize982B
MD5a8c50410e4696260a2d92a8cdff2dc32
SHA1a3ee5731661d37b0b4da01ff9881e6c2b26303c3
SHA256b8a1d728b9ce9ba9465eee3fecb48c0cc0821ae7ca47fbf3f105ab5b7dc426b4
SHA5127cebe7669c20ced7daaea55e1703a37d4d2bf6fdfcee1d3550c153adff93353d4b409c9b43cd2b96057c7796c2b503b18e22ef7b2a02760fe4f59b7e4b3ec1ea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\e6a125f5-bab3-4a2b-8906-43d4695c80c3
Filesize671B
MD5646f0382e7401b093c1cf372432cd1d3
SHA1536aba65711b71137457d25df35ca05aac0b31c6
SHA256938e7fd73a2a9c7b9f70c3f9f8cbfda75b9645e4ada30d7455a90b18b8965526
SHA5125c5c28693cc4a7121e90e37d91a33778f15025bdecb5986ebe149da8c542c4d5b3126c2add9bdbb36acbcc0ed6349c9790ebd2feb2f9edda824e63240b30d7c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5f778e1c5c72a8410357905d351f73afb
SHA12329a228a9f8bcf16ff6ef649ea27c4c9f0a2f3d
SHA2566aeeea894e4137f7f66fb4c9627d2f31c33dc1efd57fa1851d0a32bff45f5618
SHA512e7d9fb84456306ae55038c72ed816ffbea50ce77dc789b3791706362affb58a06c2764b044ef52243712efbf70228ccf0ba2bae05645f8198697c5278d022535
-
Filesize
12KB
MD562d4728011a6042a3d78798b0c21631f
SHA133dc09ff50cf9470d91fdec23c65a8a4901038b9
SHA2561951522a265af5061c05abadaec9e680e7833dc174c1842a8e6439f47cf477a9
SHA51286430e4b921cf5f0c9778314a0212e6ce75a404066f66bedb79a3ad014268d56177e669b23262c672903bf48a5395b7d7677622fe22f7a8ba588b5eb74713c4f
-
Filesize
15KB
MD5380abf3c7f10d375b882259e094158cc
SHA16ef3ae674533d05eb944ed18bc14375bf498d5c3
SHA256180e0df1ccc9d0375f6f688ee3cd0d8ddcb2370421add1c21774162c684d7036
SHA5126fc8b1bbeea9fcf4e7f6282b2366d6f0ee43e46a17b8eb6683600292a97a11f3a8c18ed879b3a67fe4194e6a2067a1ce8ae73817454e34df94593d09c46a1cee
-
Filesize
10KB
MD5274c46b0ce854c18b8459aef608b3558
SHA10c1f45786c7281e3404e4353e003ed2e7804dd27
SHA2565613662701fa99edf56df8720191dcc7af918bf2736611ffab4fa4de54b85f4b
SHA512340131294ed2cdd4db96513f7c210a8b1b154c98ebfbd3038182f3e9bcd8544e6bba7742066d936220abebb6417579aada3c80253336732acf8c3e7a340b8b42
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e