Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe
Resource
win7-20240729-en
General
-
Target
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe
-
Size
1.8MB
-
MD5
ea7705c2143e7c21967211c16fceb549
-
SHA1
5ed0a996617121fe8c267bcb2b7e7adcbf8cf1be
-
SHA256
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34
-
SHA512
202a3862bf26a9e3b839c38a30b62473bc4190b010fe54520ffb4ea10a2a0fbb424efa08df14c6df88bfb0669d48cb22e358bca374bbb1391055521d18bc875c
-
SSDEEP
49152:vuYKP41uIfWVr1H9muoLiwthIySOt8r+wc3Tfvuv1WNQsU/xWlE:vf84IiWB1IuoL7SOY+xjfvgxrw
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2160-43-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
7cecc8ddd9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 7cecc8ddd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 7cecc8ddd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 7cecc8ddd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 7cecc8ddd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 7cecc8ddd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 7cecc8ddd9.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
5cb83354ee.exe650a140971.exe60632d070c.exe7cecc8ddd9.exeskotes.exeskotes.exef177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5cb83354ee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 650a140971.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60632d070c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7cecc8ddd9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 4004 chrome.exe 688 chrome.exe 3608 chrome.exe 1612 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
650a140971.exe60632d070c.exe7cecc8ddd9.exeskotes.exef177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exeskotes.exeskotes.exe5cb83354ee.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 650a140971.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60632d070c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60632d070c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7cecc8ddd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5cb83354ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5cb83354ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 650a140971.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7cecc8ddd9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exe5cb83354ee.exef177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 5cb83354ee.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe -
Executes dropped EXE 14 IoCs
Processes:
skotes.exe5cb83354ee.exe650a140971.exe60632d070c.exefadd0d5d00.exe7cecc8ddd9.exelll.exelll.exelll.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 4328 skotes.exe 2160 5cb83354ee.exe 760 650a140971.exe 2212 60632d070c.exe 4712 fadd0d5d00.exe 5572 7cecc8ddd9.exe 2768 lll.exe 5156 lll.exe 5164 lll.exe 5388 service123.exe 5852 skotes.exe 6136 service123.exe 4732 skotes.exe 4580 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exe5cb83354ee.exe650a140971.exe60632d070c.exe7cecc8ddd9.exeskotes.exeskotes.exef177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 5cb83354ee.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 650a140971.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 60632d070c.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 7cecc8ddd9.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 5388 service123.exe 6136 service123.exe 4580 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
7cecc8ddd9.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 7cecc8ddd9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 7cecc8ddd9.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\650a140971.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008237001\\650a140971.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\60632d070c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008238001\\60632d070c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fadd0d5d00.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008239001\\fadd0d5d00.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7cecc8ddd9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008240001\\7cecc8ddd9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008239001\fadd0d5d00.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exeskotes.exe5cb83354ee.exe650a140971.exe60632d070c.exe7cecc8ddd9.exeskotes.exeskotes.exepid process 3780 f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe 4328 skotes.exe 2160 5cb83354ee.exe 760 650a140971.exe 2212 60632d070c.exe 5572 7cecc8ddd9.exe 5852 skotes.exe 4732 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
lll.exedescription pid process target process PID 2768 set thread context of 5164 2768 lll.exe lll.exe -
Drops file in Windows directory 1 IoCs
Processes:
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exedescription ioc process File created C:\Windows\Tasks\skotes.job f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5760 2160 WerFault.exe 5cb83354ee.exe -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
7cecc8ddd9.exe60632d070c.exetaskkill.exelll.exelll.exeschtasks.exeskotes.exetaskkill.exef177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exetaskkill.exefadd0d5d00.exetaskkill.exetaskkill.exeservice123.exe5cb83354ee.exe650a140971.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7cecc8ddd9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60632d070c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fadd0d5d00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5cb83354ee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 650a140971.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe5cb83354ee.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 5cb83354ee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 5cb83354ee.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 3964 taskkill.exe 3804 taskkill.exe 3228 taskkill.exe 3936 taskkill.exe 4892 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exeskotes.exe5cb83354ee.exe650a140971.exechrome.exe60632d070c.exefadd0d5d00.exe7cecc8ddd9.exeskotes.exeskotes.exepid process 3780 f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe 3780 f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe 4328 skotes.exe 4328 skotes.exe 2160 5cb83354ee.exe 2160 5cb83354ee.exe 760 650a140971.exe 760 650a140971.exe 4004 chrome.exe 4004 chrome.exe 2212 60632d070c.exe 2212 60632d070c.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 5572 7cecc8ddd9.exe 5572 7cecc8ddd9.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 5572 7cecc8ddd9.exe 5572 7cecc8ddd9.exe 5572 7cecc8ddd9.exe 5852 skotes.exe 5852 skotes.exe 4732 skotes.exe 4732 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
chrome.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe7cecc8ddd9.exedescription pid process Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeShutdownPrivilege 4004 chrome.exe Token: SeCreatePagefilePrivilege 4004 chrome.exe Token: SeDebugPrivilege 3964 taskkill.exe Token: SeDebugPrivilege 3804 taskkill.exe Token: SeDebugPrivilege 3228 taskkill.exe Token: SeDebugPrivilege 3936 taskkill.exe Token: SeDebugPrivilege 4892 taskkill.exe Token: SeDebugPrivilege 4340 firefox.exe Token: SeDebugPrivilege 4340 firefox.exe Token: SeDebugPrivilege 5572 7cecc8ddd9.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
chrome.exefadd0d5d00.exefirefox.exepid process 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4004 chrome.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
fadd0d5d00.exefirefox.exepid process 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4340 firefox.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe 4712 fadd0d5d00.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4340 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exeskotes.exe5cb83354ee.exechrome.exedescription pid process target process PID 3780 wrote to memory of 4328 3780 f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe skotes.exe PID 3780 wrote to memory of 4328 3780 f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe skotes.exe PID 3780 wrote to memory of 4328 3780 f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe skotes.exe PID 4328 wrote to memory of 2160 4328 skotes.exe 5cb83354ee.exe PID 4328 wrote to memory of 2160 4328 skotes.exe 5cb83354ee.exe PID 4328 wrote to memory of 2160 4328 skotes.exe 5cb83354ee.exe PID 4328 wrote to memory of 760 4328 skotes.exe 650a140971.exe PID 4328 wrote to memory of 760 4328 skotes.exe 650a140971.exe PID 4328 wrote to memory of 760 4328 skotes.exe 650a140971.exe PID 2160 wrote to memory of 4004 2160 5cb83354ee.exe chrome.exe PID 2160 wrote to memory of 4004 2160 5cb83354ee.exe chrome.exe PID 4004 wrote to memory of 4152 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4152 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 1080 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4644 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4644 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe PID 4004 wrote to memory of 4656 4004 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe"C:\Users\Admin\AppData\Local\Temp\f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\1008236001\5cb83354ee.exe"C:\Users\Admin\AppData\Local\Temp\1008236001\5cb83354ee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8ce19cc40,0x7ff8ce19cc4c,0x7ff8ce19cc585⤵PID:4152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1924,i,8462838809317493550,5643940433947692019,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1920 /prefetch:25⤵PID:1080
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2148,i,8462838809317493550,5643940433947692019,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2156 /prefetch:35⤵PID:4644
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,8462838809317493550,5643940433947692019,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2236 /prefetch:85⤵PID:4656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,8462838809317493550,5643940433947692019,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3168 /prefetch:15⤵
- Uses browser remote debugging
PID:3608
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,8462838809317493550,5643940433947692019,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:688
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3152,i,8462838809317493550,5643940433947692019,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4244 /prefetch:15⤵
- Uses browser remote debugging
PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5388
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5476
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 17724⤵
- Program crash
PID:5760
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008237001\650a140971.exe"C:\Users\Admin\AppData\Local\Temp\1008237001\650a140971.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:760
-
-
C:\Users\Admin\AppData\Local\Temp\1008238001\60632d070c.exe"C:\Users\Admin\AppData\Local\Temp\1008238001\60632d070c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2212
-
-
C:\Users\Admin\AppData\Local\Temp\1008239001\fadd0d5d00.exe"C:\Users\Admin\AppData\Local\Temp\1008239001\fadd0d5d00.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4712 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:3780
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4340 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1928 -parentBuildID 20240401114208 -prefsHandle 1844 -prefMapHandle 1836 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {36b8ceed-4cea-454f-aac5-427aa6f07217} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" gpu6⤵PID:1016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2364 -parentBuildID 20240401114208 -prefsHandle 2356 -prefMapHandle 2352 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {88f2ec96-0247-49fd-a010-fbd1586e994a} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" socket6⤵PID:1764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3148 -childID 1 -isForBrowser -prefsHandle 3160 -prefMapHandle 3156 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1ecdfb24-67bb-4274-b4c1-ef1c0da050a0} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" tab6⤵PID:3852
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3744 -childID 2 -isForBrowser -prefsHandle 3724 -prefMapHandle 3576 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {727b759b-b7f4-4901-9fa5-468354b476a1} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" tab6⤵PID:2568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4320 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4340 -prefMapHandle 4336 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d7717c23-41ea-4086-bb37-4c8f20147a48} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" utility6⤵
- Checks processor information in registry
PID:1728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5212 -childID 3 -isForBrowser -prefsHandle 5204 -prefMapHandle 5188 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c4c3221-0155-4949-b880-1e29d40e2641} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" tab6⤵PID:5780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 4 -isForBrowser -prefsHandle 5360 -prefMapHandle 5364 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c47abb4-0d8e-4b0c-804a-f093cec033db} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" tab6⤵PID:5792
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5632 -childID 5 -isForBrowser -prefsHandle 5552 -prefMapHandle 5560 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {87640e3e-2d23-4688-b913-5b0d9d22def2} 4340 "\\.\pipe\gecko-crash-server-pipe.4340" tab6⤵PID:5804
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008240001\7cecc8ddd9.exe"C:\Users\Admin\AppData\Local\Temp\1008240001\7cecc8ddd9.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\1008241001\lll.exe"C:\Users\Admin\AppData\Local\Temp\1008241001\lll.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\1008241001\lll.exe"C:\Users\Admin\AppData\Local\Temp\1008241001\lll.exe"4⤵
- Executes dropped EXE
PID:5156
-
-
C:\Users\Admin\AppData\Local\Temp\1008241001\lll.exe"C:\Users\Admin\AppData\Local\Temp\1008241001\lll.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5164
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2160 -ip 21601⤵PID:5720
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5852
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:6136
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4732
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4580
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5dbfc06009c9dc0cf0f3d27696e3b0a40
SHA11b055290ba87294e04f43d8b2c730d052abe8631
SHA256f122eb1efb3015f2979aa1bea666a9a25824540d359ecb0181a3ce6b9088fdfb
SHA512af86fd4bd2e3d976ec5ba6229c30c094670d18543c0f729581b4b6d4eaa75f9d6b7282209f431f538169b73b15e272d7d00254150290305534e4b92dbe28d4e0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5812cd8b80d10725fabdd35af2845f346
SHA14eebc2c53b2c03000c00cf73c1f7d43abbaef8f6
SHA256bc56d3b68883fe9092d554633f1ac70e3844905c87525dd8970abe387d74bb73
SHA512eeecda8b10ec4f9553c58226a6fc6bdbf487649cea4d4baa88c314eb909d9fd7617bbdf5ea94388b89597955f02a7c61a54b21415b3219e697e85a95ab470391
-
Filesize
4.2MB
MD53540f08b37b30b6c554e0e5ff05a8e97
SHA11ca146fe61b66a73900f1008f8267ec5554413c2
SHA256562ab7435cbde0c5528a05f60ce959fa9b428d3378f4d0f5b22f48eb09fe13e6
SHA5129ca4c49a620c2cb06a8c334d1cdce999579f3dcd472b10e7227c54089efe9e68844bfc0e2d34e0b72558e714b01094eeaa849b30566b1d7e7461fe928f1ed201
-
Filesize
1.8MB
MD5d52a17d31b33d3217bc5bcb6804c27d5
SHA11ee51e35abd1af1c72dc30a74eedd51fdd660e3b
SHA2563d39460a9254daa6b78f2957f452f5368dbb47f5dbfd51d3a69ba84ec9719eb7
SHA5129ad31decb22cd2a9f5ef446cca0c28f04165ea609258ab0087530253f8252bf8915bc711695c6e72a169ab648ee5f4090ab9c45055a1a6086b952cd00d8a95e3
-
Filesize
1.7MB
MD5e0205bfeadfb01c33d5a13ede54fbf10
SHA13ef5bc11132a9dd29a98e80db03f4c19494745b9
SHA2566b6a89b114bb94bef88235b97bfe7dc73933be77b833cb7fc522def6f37a415d
SHA5121d5d157fc2078b2db86e421057a52fc47cfe424fbedf6eec6865ab84385bfb8c7ba454f8e5a9d58712cf1c1346f633530649742e72e2cb576a14164af29f289c
-
Filesize
901KB
MD5f2b30bcd1f22e596f3fc49af0b3056f0
SHA10521752bd3d15a67f74e1bc88098ffaea7026ade
SHA256db7113060f611073d4f233254166c07fc9e523f5374e2a770071d7c98238f4b1
SHA5122fd6f01b6392745b3a76974188ff0257d69873fa7899a8ed6330a05b4890b18a86b78a9e59ee89fdeece17f7980a073c03039e39dc8c2b500770fe3b3dd8496a
-
Filesize
2.7MB
MD565650d0918fa25e48b9becb46f001c3f
SHA109b56cc99dd74ccfbf08166023c9be6aa5132970
SHA256ab0c3f5cfb603911e16064d4d783ed4b44e74242325f073dc49beded13b5944e
SHA5127f1d5bf947fa5626fcb7a7420e2795f47240940e6788159fecbce3eeb3c6ab790710103c19d2344f9b37b55fceb52abaef8c4f27aa08e2b043dcd61c292a0a4e
-
Filesize
481KB
MD5b8296c353c157263195539504ea1bb9b
SHA1a0e63246fc2aee469a0523f86c1dcb846d02d844
SHA256fcd7fb6bd93a6a6987262b70379c20e553703205e6594101ef053e1bae44feff
SHA512c524fc748152d46841db8899ee5ea58d1c7f6f5d7535166b7441b8151b21642a798b7daf4a7b6898063cad3d0ba57a852b01617376ff65709c75313894108f49
-
Filesize
1.8MB
MD5ea7705c2143e7c21967211c16fceb549
SHA15ed0a996617121fe8c267bcb2b7e7adcbf8cf1be
SHA256f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34
SHA512202a3862bf26a9e3b839c38a30b62473bc4190b010fe54520ffb4ea10a2a0fbb424efa08df14c6df88bfb0669d48cb22e358bca374bbb1391055521d18bc875c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize18KB
MD5541e5d02af30ccd787d0db257af8bced
SHA11abf374a218517749c9242e6064ac6c4debf4607
SHA2560a1ad56ce3fd91a5a97cac10798dfa1378f39f0d27a8024565b6471e048abd39
SHA5127118fed3ca15055995cc115de1d6628b7b5cfb0c299fcb3ed7dc950e6d166572bf4c51d70b86eb35564a782f59bfebea6d0783da16d0b454079f49bc973406e4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize6KB
MD5d072c9bf17cc097bb0012f25afd78208
SHA121ea4b11d632a1239bce442b5195fdbd368a1e31
SHA256d0ed7c40a1d9422711591d55b5e5b0e6c15987d477ffdae8b299281401adf43d
SHA5125050cd658b1736709ee8099684e7db19a1e22b46611c5f2c825a0fd68856037640c9ca481213b6115dbcd70d80613c5e3c0b44a83e84a86b07cfc183acabc947
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD525d4cf59f278501b2c38a13b687cd8b7
SHA1d005d75940366b95168a59ffbbd65e78a250f6aa
SHA256a74f51f2a9f5841a41328c8a4564e3ad7eac3185aac5bc745f5e3a1439e6ce0c
SHA51214fd000d2720c10479b273f31d2ee5ec938bfc4deab9bc2f4e0997021f8fdf0493bd40238dad36572ede66f26e46997150b11354c83926f7ad87d26f1b9df876
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize13KB
MD587fe364fc6d7954d083934cff09c4d6c
SHA1d6d5a34a230389ad83eb61598e826c23eb40fcd0
SHA2560e70e90df04800157b5b85c4b8d41a68794c1734dce9a9ceb341df2874a6b751
SHA51232e72705be292f2c867916e66c97db9501b729ef36ff626d9e44b32765ea5ec710c48246dfcb7bb9e64cec0d6690e11a928fe8c971d62b9301cc7162f26fd1f9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.bin
Filesize15KB
MD599af17c5ef747ea1eda36de8e342467a
SHA16683a96d2fba19ba809f7c04534e3a0e718c3ee9
SHA256fc30d7af9d94868c1363bd9c83ae371ac9f1b13015bb4f42a9273fc4ea4117b9
SHA512f26d10daa12b9d7535d0b5b014ad8d1f215059e74912ad29b37f6bf07097bae949de9b13089ff3ef8a45438b1567162dcb68411b81bff0187aba35d753b05037
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5c2587f4e9f92fd1a55c516fb2983161d
SHA1824aa0a7683fbbeb1d7efe1d6577d094706d1c96
SHA2560ee7acf9f90fd264759b0003a24ac682d56652508d3a1e13f0d32c1b23678f01
SHA512c93cd738234be67825fbf614fa31343b22d533f9480edc1dc2399eecb02e80f4cbca5386f8764bfa86eb4afc55f13e9aefd177fd6d3612e3e0d6e86aed3378e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD59dbfb805a5043ebe55cd96ecba04820f
SHA1e4108e6e34fb722bded1976df50429b5d71a6f83
SHA256afa9a743f6d874bbfb4d41a4ee7ed2770f4d1919ffb22b3929e3cb76256cca65
SHA5121ca329847ac0ba7f729cea87c0d14e417bc431d259caa5615d1187f20681f8d22b196ce1e47adfbb26baae785493a27ac6c8603a8c3a8ea8757ff9c8fd527e64
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\6f3b340e-124a-4163-9340-877f87fb5a62
Filesize26KB
MD5f6f35996d71f7f8b8ad280a126ec9217
SHA1e87fb4bf58a22aea8981c4686df0047bc91ad6b4
SHA256727151218edb030a0907c650d140d8bfd367b8b1fb628112e6b7429125def804
SHA5120acd6be7bc9942a21442079ec4fd94d10de97d672f8240a4518d469cb0f825582de2b2382391505692f343c37650ea1c58952fd262c9780d0437e4ad2061a6d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\965e4628-9dcf-40e8-bb36-342a45978f92
Filesize982B
MD53aab15414cb61df800c2ed44b9f5734e
SHA18e44c28ca8bb574d3267a2ec4f8a348a37eaa4a8
SHA256029b7fa5e3ebd674b79c0416d04751ad9b170b96f1ce64df8eb96232957f1fa0
SHA5126c2c21dbce231f77a90780457c4f72c9c1dec75b2f71615b946766dcfd2eb0e8d0ae0523e825c9086d3c7dfef5f7358813c4dc177b966ffcf13e77ee2120840c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\d126a4e0-9624-4552-b6f4-32b48eba158b
Filesize671B
MD546ddc0becb85d61305c719a11cc65ca6
SHA1c3f7dbc948674a3f280470fa48882a1cb4fda00b
SHA25653d15106a6916c8b643cdcb961153884743f4f8ac69fb3551db36f0dd681fb4a
SHA512886ed8cffade8ffda2536787ea10efb66d7a01da55e70bc0c5cc9f3079747d381f6e74d5e8fa81785e917b31c4f8e0fad76acc1e3414c50a4a8ca2e37a688017
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD56da5c91b1834712ce39beaadb54e07a8
SHA1df6d0242fb71b4be312bc628d25167a2322e2602
SHA256482f23cc6e288db820a2519f2e82aae455e1171d5fb7dc93f88c186a71ea1724
SHA512b63dd85aebd55efed89371774231a3bd15d91d66b03b4d15674cf518b552a8cfdc03abf61a73b129a4246351bf72185685a2cf694756810990571db3b5f4014e
-
Filesize
13KB
MD58a24b41328d306f18c7124608ded6fbf
SHA1ad4557c20255e5c4b4b8cb098a893217f91ed66e
SHA2569311c9720dfb32fd0779d449ee2df8767e6836e8e98bc0090d1865a1943cb3af
SHA512c9afe53c06d07dcd212a62b904f1dbbb2a07f1ba74112a8055f2786a8a8f94784b418f9b8fd0f4102a8380a150ed9a8b40c66d16752e5eb1c35318f3f65b71fa
-
Filesize
10KB
MD5938702ae8e34825c4358c1c5a4a25e8d
SHA129d7035a74c90d4a165ac8608d06e7a741f84dbd
SHA25659a6106f22e62603cb5833722384015c23e0c8aaf4a858fca327f189c59dda8c
SHA512da4c3a6dc379abeca73b46a75d189aca6a46de133ccda9bdd617ef6116589d8200190f51c5ad4b76125c62b68853975a1a5df2ff132ebc08cce4ad3d950f2087
-
Filesize
10KB
MD5d1d7b172451ddbb2f77f023de2a70580
SHA1cc6ac21c37e506c555f7fcc6468d258a681fcc4b
SHA256f296347cba0764e8a81f5a7b6cf0baacaecd1ab390bae64cf9c311c2ef90c78c
SHA512a892ecd10efa6b77948c6f03e8692bbd812e185f79c2d70c768e0882e468cfdfb522ad0ce082799e9967efdc033dd796cde1813d1b7080c90c4b5b658811c040
-
Filesize
13KB
MD54df002ae2b1e37f318f5681b2bef7c3a
SHA14ba6c23b6b31e3fac6d736771bea590edb5f9aee
SHA25670064658e118e6fe886549d99b87c5c1f9aedefa54853a6c747a47b051d8ef4e
SHA51289d2f41914fb6c46f14844e9fa92effa1ce0efc5c5c97470b9638f7e007199525eca6cf6a892aed59e3448b8680b022ff3d9ca435ee650a74014e49ce024a9a7
-
Filesize
10KB
MD5089c17080d52f392b0dfa1eaf70d1087
SHA1e741d70e9ee8618052fd8093a3f293f00a502b5a
SHA2560755a3ea9ebf75a3004c2dd38deb1af7f5cf974fae6433affd86416bd502f628
SHA51235919b559cb2ba43232983ddb8fc72c5557351274f19c265e69d8ddb8f8a4c686a266b5ce0ea00868719766988d3e527db89a29b31f77cf57e0ccc70522168e1
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e