Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe
Resource
win7-20241010-en
General
-
Target
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe
-
Size
1.8MB
-
MD5
fc60fac3b512854df25f9a62a8982b5f
-
SHA1
55bdf77f2f4e613f2aaf0a3cc22fc2e68678ac7e
-
SHA256
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687
-
SHA512
0603ef0b95cd18343686abf01d0dd7fd7f55693bdcc308fd50d9a66de65f6c25c3401b21fc73aa91a7e50e3217fe127071faa836425eb0b650621422ce26389b
-
SSDEEP
24576:jSW/ofKP26CwSz/h3O2In5iOSCeRWwBuP/xD7LCSWSA2yJNjsu9yk5H0RhbB9XfB:jp/w6CjZO2U5iOSNRbBuhC7LqQHANlB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4332-102-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
8c04ea8764.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8c04ea8764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8c04ea8764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8c04ea8764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8c04ea8764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8c04ea8764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8c04ea8764.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exe19f8470cb3.exe66103e05a3.exeskotes.exeskotes.exe1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.execcd798fb64.exe8c04ea8764.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 19f8470cb3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 66103e05a3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ccd798fb64.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c04ea8764.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 3508 chrome.exe 5808 chrome.exe 5756 chrome.exe 596 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
19f8470cb3.exe8c04ea8764.exe1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.exeskotes.execcd798fb64.exeskotes.exe66103e05a3.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 19f8470cb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c04ea8764.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c04ea8764.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ccd798fb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ccd798fb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 66103e05a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 19f8470cb3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 66103e05a3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.execcd798fb64.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation ccd798fb64.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exeskotes.exe4.execcd798fb64.exe19f8470cb3.exe66103e05a3.exe10ac0dfbac.exe8c04ea8764.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 2304 skotes.exe 1912 skotes.exe 1864 4.exe 4332 ccd798fb64.exe 2916 19f8470cb3.exe 3404 66103e05a3.exe 3956 10ac0dfbac.exe 2944 8c04ea8764.exe 2584 skotes.exe 5740 service123.exe 4424 skotes.exe 5220 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.execcd798fb64.exe66103e05a3.exeskotes.exeskotes.exeskotes.exe19f8470cb3.exe8c04ea8764.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine ccd798fb64.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 66103e05a3.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 19f8470cb3.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 8c04ea8764.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 5740 service123.exe 5220 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
8c04ea8764.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8c04ea8764.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8c04ea8764.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\19f8470cb3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008261001\\19f8470cb3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\66103e05a3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008262001\\66103e05a3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10ac0dfbac.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008263001\\10ac0dfbac.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c04ea8764.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008264001\\8c04ea8764.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008263001\10ac0dfbac.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.exeskotes.execcd798fb64.exe19f8470cb3.exe66103e05a3.exe8c04ea8764.exeskotes.exeskotes.exepid process 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe 2304 skotes.exe 1912 skotes.exe 4332 ccd798fb64.exe 2916 19f8470cb3.exe 3404 66103e05a3.exe 2944 8c04ea8764.exe 2584 skotes.exe 4424 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exedescription ioc process File created C:\Windows\Tasks\skotes.job 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008259001\4.exe embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 432 4332 WerFault.exe ccd798fb64.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
66103e05a3.exetaskkill.exetaskkill.exe19f8470cb3.exe10ac0dfbac.exetaskkill.exetaskkill.exeschtasks.exe1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.execcd798fb64.exetaskkill.exe4.exe8c04ea8764.exeservice123.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66103e05a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19f8470cb3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10ac0dfbac.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccd798fb64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c04ea8764.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.execcd798fb64.exefirefox.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ccd798fb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ccd798fb64.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2244 taskkill.exe 3940 taskkill.exe 2696 taskkill.exe 1912 taskkill.exe 3560 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.exeskotes.execcd798fb64.exe19f8470cb3.exe66103e05a3.exe10ac0dfbac.exe8c04ea8764.exechrome.exeskotes.exeskotes.exepid process 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe 2304 skotes.exe 2304 skotes.exe 1912 skotes.exe 1912 skotes.exe 4332 ccd798fb64.exe 4332 ccd798fb64.exe 2916 19f8470cb3.exe 2916 19f8470cb3.exe 3404 66103e05a3.exe 3404 66103e05a3.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 2944 8c04ea8764.exe 2944 8c04ea8764.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3508 chrome.exe 3508 chrome.exe 2944 8c04ea8764.exe 2944 8c04ea8764.exe 2944 8c04ea8764.exe 2584 skotes.exe 2584 skotes.exe 4424 skotes.exe 4424 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe8c04ea8764.exechrome.exedescription pid process Token: SeDebugPrivilege 3940 taskkill.exe Token: SeDebugPrivilege 2696 taskkill.exe Token: SeDebugPrivilege 1912 taskkill.exe Token: SeDebugPrivilege 3560 taskkill.exe Token: SeDebugPrivilege 2244 taskkill.exe Token: SeDebugPrivilege 4584 firefox.exe Token: SeDebugPrivilege 4584 firefox.exe Token: SeDebugPrivilege 2944 8c04ea8764.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe Token: SeShutdownPrivilege 3508 chrome.exe Token: SeCreatePagefilePrivilege 3508 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe10ac0dfbac.exefirefox.exechrome.exepid process 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 3956 10ac0dfbac.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe 3508 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
10ac0dfbac.exefirefox.exepid process 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 3956 10ac0dfbac.exe 4584 firefox.exe 4584 firefox.exe 4584 firefox.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe 3956 10ac0dfbac.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4584 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exeskotes.exe10ac0dfbac.exefirefox.exefirefox.exedescription pid process target process PID 2296 wrote to memory of 2304 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe skotes.exe PID 2296 wrote to memory of 2304 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe skotes.exe PID 2296 wrote to memory of 2304 2296 1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe skotes.exe PID 2304 wrote to memory of 1864 2304 skotes.exe 4.exe PID 2304 wrote to memory of 1864 2304 skotes.exe 4.exe PID 2304 wrote to memory of 1864 2304 skotes.exe 4.exe PID 2304 wrote to memory of 4332 2304 skotes.exe ccd798fb64.exe PID 2304 wrote to memory of 4332 2304 skotes.exe ccd798fb64.exe PID 2304 wrote to memory of 4332 2304 skotes.exe ccd798fb64.exe PID 2304 wrote to memory of 2916 2304 skotes.exe 19f8470cb3.exe PID 2304 wrote to memory of 2916 2304 skotes.exe 19f8470cb3.exe PID 2304 wrote to memory of 2916 2304 skotes.exe 19f8470cb3.exe PID 2304 wrote to memory of 3404 2304 skotes.exe 66103e05a3.exe PID 2304 wrote to memory of 3404 2304 skotes.exe 66103e05a3.exe PID 2304 wrote to memory of 3404 2304 skotes.exe 66103e05a3.exe PID 2304 wrote to memory of 3956 2304 skotes.exe 10ac0dfbac.exe PID 2304 wrote to memory of 3956 2304 skotes.exe 10ac0dfbac.exe PID 2304 wrote to memory of 3956 2304 skotes.exe 10ac0dfbac.exe PID 3956 wrote to memory of 3940 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 3940 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 3940 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 2696 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 2696 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 2696 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 1912 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 1912 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 1912 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 3560 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 3560 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 3560 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 2244 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 2244 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 2244 3956 10ac0dfbac.exe taskkill.exe PID 3956 wrote to memory of 3708 3956 10ac0dfbac.exe firefox.exe PID 3956 wrote to memory of 3708 3956 10ac0dfbac.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 3708 wrote to memory of 4584 3708 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe PID 4584 wrote to memory of 2520 4584 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe"C:\Users\Admin\AppData\Local\Temp\1bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\1008259001\4.exe"C:\Users\Admin\AppData\Local\Temp\1008259001\4.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864
-
-
C:\Users\Admin\AppData\Local\Temp\1008260001\ccd798fb64.exe"C:\Users\Admin\AppData\Local\Temp\1008260001\ccd798fb64.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4332 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffabc94cc40,0x7ffabc94cc4c,0x7ffabc94cc585⤵PID:5128
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2036,i,7928621213468229955,18134169324793758226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2032 /prefetch:25⤵PID:5456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1908,i,7928621213468229955,18134169324793758226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2068 /prefetch:35⤵PID:5464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,7928621213468229955,18134169324793758226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2280 /prefetch:85⤵PID:5496
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3180,i,7928621213468229955,18134169324793758226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3208 /prefetch:15⤵
- Uses browser remote debugging
PID:5756
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3216,i,7928621213468229955,18134169324793758226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3256 /prefetch:15⤵
- Uses browser remote debugging
PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3676,i,7928621213468229955,18134169324793758226,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4564 /prefetch:15⤵
- Uses browser remote debugging
PID:596
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5740
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4560
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4332 -s 18004⤵
- Program crash
PID:432
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008261001\19f8470cb3.exe"C:\Users\Admin\AppData\Local\Temp\1008261001\19f8470cb3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1008262001\66103e05a3.exe"C:\Users\Admin\AppData\Local\Temp\1008262001\66103e05a3.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\1008263001\10ac0dfbac.exe"C:\Users\Admin\AppData\Local\Temp\1008263001\10ac0dfbac.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2020 -parentBuildID 20240401114208 -prefsHandle 1936 -prefMapHandle 1928 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3932f386-3d6a-4a5e-af55-34d758fb8030} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" gpu6⤵PID:2520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2432 -parentBuildID 20240401114208 -prefsHandle 2424 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {290e7b87-3922-4019-bb58-1c9a628591c4} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" socket6⤵PID:3016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3076 -childID 1 -isForBrowser -prefsHandle 2996 -prefMapHandle 3124 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c5835c8b-ec85-4b1a-996f-e7057fce2fbb} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3060 -childID 2 -isForBrowser -prefsHandle 3040 -prefMapHandle 3408 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6cdd2604-dfd4-4056-8b13-ce57fec70d80} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4656 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4664 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {34f563ed-09e5-41d8-a909-f6e208e69600} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" utility6⤵
- Checks processor information in registry
PID:5212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5400 -childID 3 -isForBrowser -prefsHandle 4164 -prefMapHandle 4172 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3099eb75-7909-4f33-977b-83e4b059727a} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:5940
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5540 -childID 4 -isForBrowser -prefsHandle 5544 -prefMapHandle 5548 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3b2667c5-719a-4fc8-a474-18bf1256fb56} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:5968
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5524 -childID 5 -isForBrowser -prefsHandle 5720 -prefMapHandle 5724 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {94bc1481-a255-4e5b-8b03-99364b4edb48} 4584 "\\.\pipe\gecko-crash-server-pipe.4584" tab6⤵PID:5984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008264001\8c04ea8764.exe"C:\Users\Admin\AppData\Local\Temp\1008264001\8c04ea8764.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6008
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4332 -ip 43321⤵PID:5564
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5220
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD5c1c23b2047abf3d8b76e43d838071f36
SHA111cd6afa74d8d54785362a4d2879da170ef55396
SHA256edf70a322311debc712b10261684a644c497331495d00ad9ba4292d918a295a9
SHA512ecf992947c54d586ff71613c9543ae511c063d14a2d922fc707793601858d66db497ed655f4ef7dcc64e8a5540675552bd8b3c5be603285abe41ad0dfa98e465
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD516e4db395c6e851bdf3f48790c53c514
SHA14f2ed9ba38cc5cc58ebda29668e0d607c0fa188c
SHA256a34404c804855763d73a6ad85f8fe28f7394bc0ff5d95f6aa8fd37e165f264bd
SHA512b8759fc18fd1bc374dc2c4c005bde64f61f0c69bedb444b2b400baf779dee71972068c9c2d0cbeda0bbd7bceeda50410e4318afa32468b120615f30b953fbbc6
-
Filesize
7.2MB
MD54cf7ec59209b42a0bc261c8cc4e70a48
SHA1415ec9061883da4cadb5251519079dfe59e0924a
SHA2562e5e8a0087e49de9ba8df196bc71e3ac0d6c2ca6095ac3ff91205bd9d8eaf678
SHA512de28c9871740577f89902b6e65c3dd00889dfcfcb3ce83fad05070761d1dc9ce4fe85f92e8443f80cf4869956a4f558b60b509302d38b1bc53b5b3536936e7d8
-
Filesize
4.2MB
MD5bc7728211118c8205e3e731e353be4eb
SHA158c807907f5384a26a02ee042e2a8ac779acec53
SHA256408c1e0d4128dd79da38e0685f991f260ed155a0c391dcea710b893c138fa65e
SHA5129da4b443fbda39f21c3dd896da5df4e9b601553ee2e8705ea998efa6e57cd24aee44109314c57a0771e705ad45fe607e71522d07402a9eb59f6d82c83eca1c2a
-
Filesize
1.8MB
MD56013bd0a6461ee49410f7032ca69ea31
SHA1fd8a0df19bc65d276d470cdade8a9e51b3046b4d
SHA25674b6afa1ca9acbfedf4f2914c5fa98a7ba622022c0017e8b4426500263719617
SHA5121ccb67495dec03213414ff1525bd7c444f060771ce4f625caeda98748e096a666e2f278971719beec8c27ee76811b52a8c24428d8eb67f9089f33afe8c866406
-
Filesize
1.7MB
MD5c524f231dbe4c55a328876f06e2a82d1
SHA18d4c24359d577fcbc818158fc79554169690273b
SHA2569561f2e19612f381dfbe538ba59f4f6f4cefe5d0d0f26f0b7fa1fcd095b9f708
SHA5121020928371c8423fa4724a3d603d7b2823f97eae93190cc1337d95993acab9507bb3f361026d1757acb64c26e553ba17e6cb91020e0a525acf2b24aa167328a3
-
Filesize
901KB
MD51b2a1d49f92876b02c7b1bd1ec1ea860
SHA1adecd3ca9c41f08a9fc03cc4b2a78e91ba1c458c
SHA25622d27367946299f0af143b358fd3883be24cddea3c40cab15f6f96b906bca976
SHA512e27f8255f1b7bee54070c61b35f954f838246cb033bf6472c5d2f5b6ec6cf73602b55b6da73595f388e138486889463edca90ce79af2b0597dea899ca4a17e95
-
Filesize
2.7MB
MD5739f477149675de9ea6d954bb446ffae
SHA1aca9016270132680f49490050e36be6b3d890528
SHA256de661c359365b8b0c0287fdc01881b208744aca0341a21bc271970975bf91307
SHA51249fbd92ec2e08daa9bfe3653c14cf346e716c875b9d2593420fb55431b568cf9295d8ee65a98864ef90c1f591550a1cf3a5dea3cb4f285e657723f84712a977d
-
Filesize
1.8MB
MD5fc60fac3b512854df25f9a62a8982b5f
SHA155bdf77f2f4e613f2aaf0a3cc22fc2e68678ac7e
SHA2561bf9d23d442e10a752d5ff0bac0fc06a679fe36f8c289ea9243f5c6d94bed687
SHA5120603ef0b95cd18343686abf01d0dd7fd7f55693bdcc308fd50d9a66de65f6c25c3401b21fc73aa91a7e50e3217fe127071faa836425eb0b650621422ce26389b
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize6KB
MD5f41b88ab970ac5975c6b1d4aea45e3d6
SHA1056b7c192e660b2b9288e8da95782a2c64fbd30f
SHA256d71a923e187b46b1cdb83e9d381f15d151fa2a0a8fb5363c956dbb1a14d4d9a0
SHA512cef665338b0167eac7d5ca738ce2594822f390a20cabd74a8594760934f8bc9c23a3724d42a1070f758f81cc1cc2df6db24f8a97ef79c4bd9e94a63d846f4a1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD5048293010ce1e7a053a5c99a5fcda08f
SHA19376e5557d1188d5f71fadef4ca3fa5c134bd58a
SHA256e05b8ac9e43ff632a7ad0dbe46618f3078b7a4fc7668838c763fb2a2c745dcc1
SHA51208cb8332b06fc8f74ed27d3057119f95e622a6a175dcf92d85247dfbe442783ea472ed826e2fca99da21edd15a91934e5ddeba98cf691a6a8610775d7c2ca30d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD57f8964f6a8a97300847f1d7a926320cd
SHA1baedda309378e060968d4ffb30984e749fc54b0c
SHA256fcc716721ac9ef17de9837074f363b694b3f39a88ffa864e40e2895292c15f86
SHA5126416fd2fa671b37392ebffb9885ffef103fea0e6374b248af51d9b16c4286164d997064e0eeb1d7440eaba44ddfc1285cbb10dd2ac709561ea8e532c50133770
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD56f4adc893404e00b3094d352adfc7f4b
SHA1c0471eb20e0d25bdf91894448a8f5b672f87ecc4
SHA256bf3cf6268b933869e652f20c6b0350a901d4587f334487649ac77601dbc23253
SHA5120127adfcdf46e1a05b9eaccc14b820041fd621a2589356804e1e36739448dfc24b8f677a25abf93e1a4b3668c9e2eb57f15afe1537dabab7247e2c1244d87619
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5116b1331fccfeedfaf6ec4e05c5e459d
SHA112fc4f278ba7041a63b566cdb87b24e6f3f01ecc
SHA256343511e81559efd2cdf31a7d56406898d0778656f101685d04b87768408de319
SHA512aa172505340723384398eed34b8f28bafcac962fc9762cd280da52370ce66d78da2ad9fd3f8e7b05b71f3dcc2d49f736a60e307420c923e21058f1e447915117
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD51fd936e3cfd7a744d714674972e0007a
SHA163370f4ecf1792e3fc5c9e752fd473a59b1ef082
SHA2568268073f128dc489a2eaae8e6a1552588d4dd2ed4f3687f4fd2fed291ce1bea6
SHA51281da07ec779f98f582e8b641296578d23879e103fc15f365a2aea0260e5a1474a3d522f9e700fa84d748fb8618a3a998ad9d915e04fd26f5950fee68e0b52893
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD587c98eb247f6c42f40440e82a3fc6105
SHA128dd199d099e5f4d671c185c3a963c8365f4ca9b
SHA25679ff45436de03542b0eb8fc46814ce8e066700315aef6908d6be96ae02f7e65c
SHA51268273e3291a863ecb5fa7b47d1b6241b428d3a8c8f7372e161cff9698e62ef4bc48b74e22686b3d92b6d1b1cde3bbbdb9d58f284e4ad73a5537de95eb03f1d21
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\40397ff3-527b-41ee-9e50-d5d243543909
Filesize982B
MD56079b8d921216f49eb9997ac8d26ee0e
SHA10b9707aaf6e14846089f0ca16228bb14329947ca
SHA256bf2f8f129eb71232bb862749643a603a4f7df73c12456e710a891b272d983347
SHA51229f4393d2fe623fb0e9d001252a71cf67460d50d642f50eab7ac13ff52e3b100328681e6d05f78bdee51c5927f39975c91ebf23c5d3295636613a42bf32f51e2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\48655b18-1d7c-4216-b900-d52e87b92584
Filesize671B
MD55871bd8685393c740d35a5446c8bdf14
SHA1fc2d6d5542767afeb5d109e0fd2ad190e3325de6
SHA2565999bb3dea7385d5f5d805a3e194ed7dc57a8fc314f12668b317b3dde068bb85
SHA5121554bfd0bec9b49c754a56fed6cd195e2032e178592c84269500c44eb44d470b08ff577a61bd6abe8caf888b48a86377143fe2973213a42890ab99c0959d40cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\749a239a-c856-40f6-9f85-971b25a0c824
Filesize28KB
MD58b8107ede91534b2a1b5f35c622ca6f0
SHA1f221532b1425cb8cc318d60735db5ae1b1cc277f
SHA25645fd2dd253e30ac120e02ed6a4c2c3441f5c13adb27877d9be13cb013a9c6a6e
SHA512c9c8deb7d48a1f9aeec01454e5945d2a0cf0d9f3b75a50146b08ee20b14a6e9417bced3a317eb1d2f8c3c199f66e7fb8532ac8baadd309e604ea5e7f886b5ad0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5dcdcdf8cbbc5fa9751513693f90a16a0
SHA1f21ac2c2ed29de3b182a476538e9f7516af7a58a
SHA256c16ff1eb668d2cde190c4ed945d1bb7f9b4fffefcde96974f661b2371862b1f7
SHA512737f088a7587682af8fcab29264d547a15608aa364f2b1ee9c68255d2c28d60ce2ccc3c405cb34693787140b8bdf6b295981a095956a7455fcd7aaf5d4c26d49
-
Filesize
15KB
MD58e74f17bf421f25cfbe238199ebc9441
SHA1e13d0497a7708262de5c01f9bf7d80af428751ef
SHA25617f0e792fdb2c2e74545c6196d405b723b9c633f2ed277c925037ad6d3533f94
SHA512618331095c9821311bc94b82dc11b27b92a37279cdfdb548952e8c6fb70e6912aacfd0250565f935d55b5e2ba52313e4531aad001c801b418148e0c4dc75e9e9
-
Filesize
11KB
MD5b2d234495f12a855a7854f4d2884966a
SHA104db789685c48f008b3044d9d747b1146025d5a3
SHA256bb3e277364604daccaf8bd3acdf4663e0ced1260527d3fb1718f8463df08acfa
SHA5125ef6c3dbe4673100de07fe6a3e9cf628ff4231a4cbe526314a8e5269c384d9ab6ac9d5cf55bab89a8fe13d890e63c41fc0ed1b450708d8136440eef7b1566dd9
-
Filesize
10KB
MD56d26deb0fa2f072fc150df8b38ccab5c
SHA1110507240b0fbe3f41d72038559c2108fc268f08
SHA256eddf185a6b6abf23bd266b7a6f6f49c73dd28e6de5ce189e62f72a008ba56513
SHA512144635bc955c6cf1e22fd770bd6fbb640da83baf6492fbcb64aff5a940f774c5221397d598efbf3151162190f3b3d13e8a980a3a947bd7232874267b9ea5e277
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.7MB
MD5f2e805d584ed40d9715c94f89224b331
SHA175b2b0e2ba15312dd3aaee089014ee2ce18a625f
SHA256ff98bb0e01c3534a0b053ac12c84e3aa12cbb3b62ba8a6d41168bd94daa90cdb
SHA512e1108629a499d2d6855562e0047acd2fbc106181a64c36084158d33021203401393116656f5d63050651e2bbe800981816b7a636f747be6d13b13f12b5dea317
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.9MB
MD59036aa20a3111f5d225fd6cc021ce0de
SHA168fe4576d1116abc407c63f794de9c066af0902d
SHA2560d32d59294f24019c4810c1e8a451b1e3a0401a6b554627f1c41c06e8dc03f3e
SHA51232237cf153b3b256558b73d188d9b539743005ecc4f5dfa3e3648629656296213fcbd11b1ae97289d2f5ea7e67f8cf926c875ec77ac6ff8df9cc3dbae678dc1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD53d078acb92db2a89808948b90206bb6c
SHA19fb61e62cbc89a27deb734db3e86f796f5b9adea
SHA2569c979ee55211ea51ccc2460dcb3244767ba967a4953951b3f7be821d8a5c2f6c
SHA512532f0921b2a8fd587e71a57339264684c3e1f2e385afad5ff4fc00e3ce517e42a77c0779f4896b24e98a03eeca3dd332119ddc6c9edfa0605b563b8417ee3aeb
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e