Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 00:13
Static task
static1
Behavioral task
behavioral1
Sample
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe
Resource
win7-20240729-en
General
-
Target
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe
-
Size
1.8MB
-
MD5
11493d823da3d6b3468f5063c0f992ff
-
SHA1
239733b908cf4f709b011be19f27a0c6ff5710ff
-
SHA256
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5
-
SHA512
b4b9d09f78c2f74f8edbf4640a5a6d41916f292e5a65c38c0a3409b909028175cfed26155a9776652b8dccf05a7d1531002ceb4ab3742b65d8238c30406c1db8
-
SSDEEP
49152:s2ZDC654mZ/BWgyhaKqsVOarqHi5HpdTL+PLMm0Oj3VZE53ZZqN:Q65JBBWpIsn5TTSTrjFZE53ZM
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/4300-94-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
52206e1bae.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 52206e1bae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 52206e1bae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 52206e1bae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 52206e1bae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 52206e1bae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 52206e1bae.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exe3f98bb1254.exe52206e1bae.exeskotes.exeskotes.exe6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe436ee79691.exelll.exec6613adbfa.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f98bb1254.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 52206e1bae.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 436ee79691.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lll.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c6613adbfa.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5960 chrome.exe 6048 chrome.exe 3244 chrome.exe 5724 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
lll.exec6613adbfa.exeskotes.exeskotes.exe6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exeskotes.exe52206e1bae.exe436ee79691.exe3f98bb1254.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lll.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c6613adbfa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lll.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c6613adbfa.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 52206e1bae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 436ee79691.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f98bb1254.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 52206e1bae.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 436ee79691.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f98bb1254.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
skotes.exe436ee79691.exe6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 436ee79691.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exe436ee79691.exelll.exe3f98bb1254.exec6613adbfa.exe71f948c9ce.exe52206e1bae.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 3900 skotes.exe 4300 436ee79691.exe 1788 lll.exe 2808 3f98bb1254.exe 3580 c6613adbfa.exe 3516 71f948c9ce.exe 3828 52206e1bae.exe 6128 service123.exe 5716 skotes.exe 264 service123.exe 5580 skotes.exe 5948 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe3f98bb1254.exec6613adbfa.exe52206e1bae.exeskotes.exeskotes.exe436ee79691.exelll.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3f98bb1254.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine c6613adbfa.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 52206e1bae.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 436ee79691.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine lll.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid Process 6128 service123.exe 264 service123.exe 5948 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
52206e1bae.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 52206e1bae.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 52206e1bae.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c6613adbfa.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008305001\\c6613adbfa.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\71f948c9ce.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008306001\\71f948c9ce.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\52206e1bae.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008307001\\52206e1bae.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3f98bb1254.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008304001\\3f98bb1254.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023ca9-113.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exeskotes.exe436ee79691.exelll.exe3f98bb1254.exec6613adbfa.exe52206e1bae.exeskotes.exeskotes.exepid Process 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 3900 skotes.exe 4300 436ee79691.exe 1788 lll.exe 2808 3f98bb1254.exe 3580 c6613adbfa.exe 3828 52206e1bae.exe 5716 skotes.exe 5580 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 5920 4300 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c6613adbfa.exetaskkill.exetaskkill.exeservice123.exeschtasks.exelll.exe71f948c9ce.exetaskkill.exeskotes.exe436ee79691.exetaskkill.exe52206e1bae.exe6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe3f98bb1254.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c6613adbfa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71f948c9ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 436ee79691.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52206e1bae.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f98bb1254.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe436ee79691.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 436ee79691.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 436ee79691.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 5000 taskkill.exe 3068 taskkill.exe 4208 taskkill.exe 4376 taskkill.exe 4060 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exeskotes.exe436ee79691.exelll.exe3f98bb1254.exec6613adbfa.exe71f948c9ce.exe52206e1bae.exechrome.exeskotes.exeskotes.exepid Process 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 3900 skotes.exe 3900 skotes.exe 4300 436ee79691.exe 4300 436ee79691.exe 1788 lll.exe 1788 lll.exe 2808 3f98bb1254.exe 2808 3f98bb1254.exe 3580 c6613adbfa.exe 3580 c6613adbfa.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3828 52206e1bae.exe 3828 52206e1bae.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3828 52206e1bae.exe 3828 52206e1bae.exe 3828 52206e1bae.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 5716 skotes.exe 5716 skotes.exe 5580 skotes.exe 5580 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe52206e1bae.exechrome.exedescription pid Process Token: SeDebugPrivilege 4060 taskkill.exe Token: SeDebugPrivilege 5000 taskkill.exe Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 4208 taskkill.exe Token: SeDebugPrivilege 4376 taskkill.exe Token: SeDebugPrivilege 3500 firefox.exe Token: SeDebugPrivilege 3500 firefox.exe Token: SeDebugPrivilege 3828 52206e1bae.exe Token: SeShutdownPrivilege 3244 chrome.exe Token: SeCreatePagefilePrivilege 3244 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe71f948c9ce.exefirefox.exechrome.exepid Process 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe 3244 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
71f948c9ce.exefirefox.exepid Process 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3500 firefox.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe 3516 71f948c9ce.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 3500 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exeskotes.exe71f948c9ce.exefirefox.exefirefox.exedescription pid Process procid_target PID 1256 wrote to memory of 3900 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 82 PID 1256 wrote to memory of 3900 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 82 PID 1256 wrote to memory of 3900 1256 6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe 82 PID 3900 wrote to memory of 4300 3900 skotes.exe 88 PID 3900 wrote to memory of 4300 3900 skotes.exe 88 PID 3900 wrote to memory of 4300 3900 skotes.exe 88 PID 3900 wrote to memory of 1788 3900 skotes.exe 91 PID 3900 wrote to memory of 1788 3900 skotes.exe 91 PID 3900 wrote to memory of 1788 3900 skotes.exe 91 PID 3900 wrote to memory of 2808 3900 skotes.exe 92 PID 3900 wrote to memory of 2808 3900 skotes.exe 92 PID 3900 wrote to memory of 2808 3900 skotes.exe 92 PID 3900 wrote to memory of 3580 3900 skotes.exe 93 PID 3900 wrote to memory of 3580 3900 skotes.exe 93 PID 3900 wrote to memory of 3580 3900 skotes.exe 93 PID 3900 wrote to memory of 3516 3900 skotes.exe 94 PID 3900 wrote to memory of 3516 3900 skotes.exe 94 PID 3900 wrote to memory of 3516 3900 skotes.exe 94 PID 3516 wrote to memory of 4060 3516 71f948c9ce.exe 95 PID 3516 wrote to memory of 4060 3516 71f948c9ce.exe 95 PID 3516 wrote to memory of 4060 3516 71f948c9ce.exe 95 PID 3516 wrote to memory of 5000 3516 71f948c9ce.exe 97 PID 3516 wrote to memory of 5000 3516 71f948c9ce.exe 97 PID 3516 wrote to memory of 5000 3516 71f948c9ce.exe 97 PID 3516 wrote to memory of 3068 3516 71f948c9ce.exe 99 PID 3516 wrote to memory of 3068 3516 71f948c9ce.exe 99 PID 3516 wrote to memory of 3068 3516 71f948c9ce.exe 99 PID 3516 wrote to memory of 4208 3516 71f948c9ce.exe 101 PID 3516 wrote to memory of 4208 3516 71f948c9ce.exe 101 PID 3516 wrote to memory of 4208 3516 71f948c9ce.exe 101 PID 3516 wrote to memory of 4376 3516 71f948c9ce.exe 103 PID 3516 wrote to memory of 4376 3516 71f948c9ce.exe 103 PID 3516 wrote to memory of 4376 3516 71f948c9ce.exe 103 PID 3516 wrote to memory of 220 3516 71f948c9ce.exe 105 PID 3516 wrote to memory of 220 3516 71f948c9ce.exe 105 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 220 wrote to memory of 3500 220 firefox.exe 106 PID 3900 wrote to memory of 3828 3900 skotes.exe 107 PID 3900 wrote to memory of 3828 3900 skotes.exe 107 PID 3900 wrote to memory of 3828 3900 skotes.exe 107 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 PID 3500 wrote to memory of 2000 3500 firefox.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe"C:\Users\Admin\AppData\Local\Temp\6fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\1008294001\436ee79691.exe"C:\Users\Admin\AppData\Local\Temp\1008294001\436ee79691.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:4300 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3244 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb272fcc40,0x7ffb272fcc4c,0x7ffb272fcc585⤵PID:4456
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2324,i,3820627802644167414,4424859867445239257,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2320 /prefetch:25⤵PID:5508
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1712,i,3820627802644167414,4424859867445239257,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2424 /prefetch:35⤵PID:5504
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1988,i,3820627802644167414,4424859867445239257,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2556 /prefetch:85⤵PID:5528
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,3820627802644167414,4424859867445239257,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:5724
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,3820627802644167414,4424859867445239257,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3340 /prefetch:15⤵
- Uses browser remote debugging
PID:5960
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,3820627802644167414,4424859867445239257,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4484 /prefetch:15⤵
- Uses browser remote debugging
PID:6048
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6128
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2804
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4300 -s 12884⤵
- Program crash
PID:5920
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008303001\lll.exe"C:\Users\Admin\AppData\Local\Temp\1008303001\lll.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\1008304001\3f98bb1254.exe"C:\Users\Admin\AppData\Local\Temp\1008304001\3f98bb1254.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1008305001\c6613adbfa.exe"C:\Users\Admin\AppData\Local\Temp\1008305001\c6613adbfa.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3580
-
-
C:\Users\Admin\AppData\Local\Temp\1008306001\71f948c9ce.exe"C:\Users\Admin\AppData\Local\Temp\1008306001\71f948c9ce.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4376
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1900 -prefMapHandle 1892 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ebafe12a-dc8d-4760-a2ae-a59ae28d3aea} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" gpu6⤵PID:2000
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2404 -parentBuildID 20240401114208 -prefsHandle 2396 -prefMapHandle 2392 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7fd5de8-2324-44d8-9249-66f39d442b8a} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" socket6⤵PID:388
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3012 -childID 1 -isForBrowser -prefsHandle 3092 -prefMapHandle 2944 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9aed4438-1928-40e9-b55f-670776344756} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab6⤵PID:2484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1236 -childID 2 -isForBrowser -prefsHandle 3896 -prefMapHandle 3892 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fef89e3b-b6a8-4a91-8168-343135f96dd3} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab6⤵PID:3032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4764 -prefMapHandle 4736 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {064d11ef-d7e5-42be-a33a-a48af9d11838} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" utility6⤵
- Checks processor information in registry
PID:5416
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5156 -childID 3 -isForBrowser -prefsHandle 5148 -prefMapHandle 5144 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f109b8d9-dbdc-40c5-837a-7f7c4c7ddaee} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab6⤵PID:5780
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5296 -childID 4 -isForBrowser -prefsHandle 4916 -prefMapHandle 4912 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9394b69b-883a-4a9e-8dbf-c0a008ceac81} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab6⤵PID:5868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5480 -childID 5 -isForBrowser -prefsHandle 5488 -prefMapHandle 5492 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {03b32371-4b1e-491b-9ad5-b021f0aecd6c} 3500 "\\.\pipe\gecko-crash-server-pipe.3500" tab6⤵PID:5968
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008307001\52206e1bae.exe"C:\Users\Admin\AppData\Local\Temp\1008307001\52206e1bae.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3828
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:6008
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4300 -ip 43001⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5716
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:264
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5580
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5948
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD5ce432fc184c3982d3834e8fbfa420f5b
SHA1535435011b6ef2bde051cc9c4e504cd5e9b44965
SHA256ffe7ffcc00553c779389546f81e62ebab798c35a53362123177a9c5811c9e5d8
SHA512d155c289fecb2786dc6c8431b356c6751f21aff0caa9a975849561eda27abc8a3084e47cfc6ad22c0492d1d05e4e57ccacd20d47e13b68e5359c6248aa5f90f7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5b1269472d7e59d376874b37e9e8aa6ee
SHA1e8209a1939e460781557a599badabef9a52d939c
SHA256ef696574f8a0f312b8597279b978cec2eab87bf485ce826d83c38b9ee803ab78
SHA5125bcc787017f2d374358f22f6719d16b5bf03e89804031919c68554a49bf88694172d422b4ee2187db94460e15225b029c56b3a87bd610103d6ec934c8f114ed0
-
Filesize
4.2MB
MD54c6bba984af9160dde6f2e0dd0e0bc79
SHA1f640dbc263db012465255670a489800705aea14c
SHA256d95e7aa0b2f5b8cc914cd095b0695377f7d73fda2b9571bed2cc55ac30e6cc89
SHA5121093c8650a8b1465cae21a1f7dc31a2603f1f57aeb09af7105a0dbb256eb4eefa3ffa27a937716f4dec1b38f67e44209d348dcd93a6827ad12dc8f23dad6f2f5
-
Filesize
1.8MB
MD5ef791b7d99a63481993ad96a9f043e71
SHA115797d3eb2e5104cb3a518aed8df3f77fdda010d
SHA2569097b54392451d73b37577c5f606e5959c62deab4f359cf671adc62897452b49
SHA51259897ef989594b8261fe0ce15515e1784f8943155c672dc68247412a6afd888723114c581b5adac5df1c469d1a6ba12f3a9d3e9c79a3b2095acd0801e82c3377
-
Filesize
1.8MB
MD5a60c25a4d738790afd6dee836c9a6370
SHA19cf4e4cbb6959563f5157531870732e5f396d8e8
SHA2564918ed5ffe96ef5018cae368bccc000a5d8f6e9e9e79cba7a224551b8812f2f7
SHA5123c5db80a1dc60be143b24583386095d2d64aa3818a55a38c285824bad8cf9445c181952447c811dd4dc6771d5706fb68d3eddf42d33215471a3081e92063bc80
-
Filesize
1.7MB
MD5d54b0c8f7977a9e67948bab655fb380e
SHA10ddd15bf45362013fb845f4b6155ab40f039cafe
SHA256bba96c9d29c016a476eb149b7bda86ef059dc25246555f4212d95be8f98e3859
SHA512839c0605b497a6e38040dc2d6e261ee803d41149177b87928d29b9d7302c7a59e10732cdffc2a990b016cdf8899a782f3f25307717709ee27b5f51928afc4ddd
-
Filesize
900KB
MD522cf487ce98b0da943ae302f604fb6b7
SHA17a8c111c0e4f0d1ca9250bfad6197651e44d1e62
SHA25646d31e7cda03e35594111e0bcf5f2974fead4ef432eaaf7e861136d31c450e7f
SHA5122deafc2f2af037828e347c67b072f2ee763ea309961bdad9797d927ea3f4233293e107cd9cefa4050a1791a8011e37242085fbdd64acf878ed577bc2bb34957c
-
Filesize
2.7MB
MD571db20b98a08be2db2c886ce000cedea
SHA1e474d668e905e5552659b72b0183948b9c2fedeb
SHA2567b86691bbde1c5576c53a617a222b739eea71488c1567b5e2b91237b508bc1da
SHA51244a25cdcb8e754881bc8109ac866dc74a88371566e35bc31713b1f7b30af12dbc256f828524f92e4b91ecf6cf5ca49c5434da5f09e811cfb9ff4467aff697cdf
-
Filesize
1.8MB
MD511493d823da3d6b3468f5063c0f992ff
SHA1239733b908cf4f709b011be19f27a0c6ff5710ff
SHA2566fc4c96ce5e5790542b4db1c237580a831c24a9aa3d01e1baef2c624b73764e5
SHA512b4b9d09f78c2f74f8edbf4640a5a6d41916f292e5a65c38c0a3409b909028175cfed26155a9776652b8dccf05a7d1531002ceb4ab3742b65d8238c30406c1db8
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD5764e228e9d2d92d1c9950acd384cb21e
SHA163416bc37dd9375bb3a8ea8a3140b44860856d44
SHA256ee66d44b996d97cd1e9d5f3778765dcefec990e0e025778a6664730e77b098ed
SHA51256dd88c5d31231240224ff3bc08a10bbaf194b4d0b4d01ae9b9fadfc0993deb66b0a8194b4d7be4fea4d4877ee1a6429f059b0430cc2526023aa1010ddcff208
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD59199daac320a55a58e897fd612de3f0e
SHA1755ef3c275ad21e76b4825b86deb0db7d2a9dac5
SHA2565af5358707329cec961f179bc5ab8bac4d61f033436f6443e78bdf5953ebca7c
SHA512beca8af710ac061f1a570955416d14e72b397fca9ce8082130f3d51020e87d5c71f911d617e68a4532b9519ad7e5645eb38d6a7294b3e24442106673166184a6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD59629eccd37294462358bfd2caf425443
SHA1977225cab26c3ca2ad350d43c81102e70ce78e51
SHA256a33d5520e8b5bc05ec74b1820f810120fa9ecd73541934a019f3e72896d69fe8
SHA51284c7c0aea3bbc842bf46a0070e310ecd17939c49a4b5be56616f1f95720b0a3e9cef70a00b28b659b3917b691552640de718785a75aea6439dd0d16145acb778
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5f6866260579e73f3a3b67b4892adb7cf
SHA15469fdac138b4859503ee96c56426a3004bfc081
SHA2562840d7d4e77ebe028de233291c208e937a467137d6476e3e4d003111f3b8872a
SHA51289ecac137ee3bad94d8ad60c5992155799d4092da81186888d3e67d4566bda9f7e164227341ae6e8a6b453dadc885c6cf75d5277ccfbfcbfb83941be0651d259
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5ae7e5f3fc7e74d856e6651c9b6a15850
SHA19f92ec5a289e53d072a424cdfd722c618c69c1c7
SHA256af02d0e6b94d8628f2fed52a3a20023ddccf42e0a880eceeec1b60bc6c455d6c
SHA51220c38604be1de0a73080015cfeec2fb3f953a93b538057b5b1188384dabfcbbcf6fd4d3c8357d062dac1a3e4b366eac7fa72ded6632c461485662a50e141d945
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\51dce8bb-f275-442e-8ba1-0851936a8e41
Filesize659B
MD5c6527f893c2ce7315799aeff91b8758b
SHA1e18ae68a6a1abb0b8de6a82705bc0446182b364c
SHA256edda44bb6647e49dea6bae12beb368ee22831c239479d69fb30fff98c4b3f4da
SHA5127210a406498a4134f2bdc9730345a86b66d40fcddaa3c0065752c3c90ff4dd5af9522a7f74500ba9758657989d130cda6e438f7d4f4d5d61ca82898b09c4b5a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\dd1cb1c6-4f09-44ee-a89c-62d6df6bd32f
Filesize982B
MD5cd456de41a2b20a4861174e03ab2ef60
SHA1cb528cf4578116781d53ed1459f21878af398ef8
SHA25682662ebdcb276b0e911eda9da691b5468e371e4f74b3df4fab4be671141c7add
SHA512adfcec00a9212a606a9a360901837cf9bc9448da6e1aa797e57417ec7327a4a1e933461c0b1b8e8e59eecc6df6e08f8633099ff92470b7c010068b66ec78daae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD59377091950f3107f4ad0a0b04b7a821e
SHA12d270cb683def5723d8322448852819c12f41f31
SHA25650278c210b222e03d5570c64f53ae1981568031c58332d58467060f6e248c32a
SHA512d3b3549d185d02851bebecb290301822391712dc3c6df768697cbfa4852c17dd58d0d5552a8d61e60ba771a14fe3fa358e992475667764356f9e9568a7785a77
-
Filesize
15KB
MD5021a2edf7e66a93c9c045143205ee350
SHA125c842f8b73e3534a9d8a5ef676bb03635e5bd78
SHA2562cef2f374c3f9b0fc8c95e6602811536003c76855b5cdad160ef94891eb334e8
SHA512709a836e7156a3e8287e513e2d92a42433585caf74965d54202708b7a5db282dd88d5ae7cc7e77e0d176f78a1a31b4d08b4f13dbbc7464dddd112c7558d381af
-
Filesize
10KB
MD5ba723374850035d49c7d233aa45d6a3d
SHA19926a16108e214ab466ddc102f50211cb0cc2dbe
SHA256a9dea544a2c4abd9d9bd1bbf03263fb936667afb51a95f130ff547363a7dbb40
SHA512b19a1c240b525cd5b294485bc90e3fb69b1f70d1dc84d039b0353e392e2c3eca06725cc47638adc6af2039ff25ec712d3523d4c776f7615bba0db33c1f023259
-
Filesize
11KB
MD592d6649fa8312412b8ae05f7398a3b4a
SHA1ed0a54121eaa7ede59d500e314758de20379e7c4
SHA256fdb0f64ec2463b53bbf4a3186e30efdbd6ff5288d164342b39ba76661db73901
SHA512c2745bcf3933c3a4b7321bb5429be6f6c0e833d7bb7a515a3fd1be9d241b3fa09fe81005747c20107dfbba799d518e666d9e654b6ade67a918c988652982ea44
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize896KB
MD59529a843a1eaead4da976c1b0c32379d
SHA1a56a87f5d13c52bdd75ede53288f2b8c5f95057e
SHA2565698b7e2e3a01747dad336c1603986543807835816071d3a781d1f01061c88db
SHA5126de437d69a0c5626a34414645372dbf6b00230bc8ce157a374121b141f899ea72d1269f7b0f926938d0e68f60b81f0d52ee42ad09a50e754c8ce27ec9cb54bef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize896KB
MD5c567b61bbae52f05324864180467ad88
SHA18cd885bec68d22bdc06c4335406a3adcaf955e16
SHA2567da2d249ecbe6379039ffd58eb4a4cfefadaab69ec1611453693d8dd449c10be
SHA5125c68183b948aadfb231015686ea5bf52d130e3ca3ef636c2de9fadf2ec9479d2fcad799f45e6ce31ca131d63abbe3c05d9729da7778cfbe18840ea43fd548981
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize3.0MB
MD506f6ebe6be06853d8d14fa5ac6d0fd9f
SHA1e45f698dbdcf81c235b73900558607f91aedeefe
SHA25670041d26704b7d01f5a29aa61efeb926f3b7f1d4c6a2d4ae0c386001036fa7d6
SHA512ffeb4360361fa99ec2c6d8c43723889a4bbeecb74f53d2035c6f3a13293406c44cc9d4a3e9ffbac45ee62b32f2c3091636d59d37aecce1f964306721d9dcc23a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize9.5MB
MD54a4b05bb13edce3e9a2379cea4c94849
SHA1b27344ac23adf32f2923e3243e8b3049966ae2f2
SHA25634368b3aa79951a7f1297836ef8917e65d2f0375e3a23e8a6f74dcb3038263be
SHA5121a599274be55c9e72edbcefb7a7286e5656b5bed8587f6d51eee16379de87feb5c516a568da951b55c6790e98b56cf82f09603b5768e2b852205fd9c09a8e7d9
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e