Analysis
-
max time kernel
144s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 01:08
Static task
static1
Behavioral task
behavioral1
Sample
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe
Resource
win7-20241023-en
General
-
Target
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe
-
Size
1.9MB
-
MD5
3204e7adeb4d554e74b4aeb310cc5939
-
SHA1
8a2a99bd088af5024c5b18f6cec3e7ec6cb460bc
-
SHA256
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12
-
SHA512
699307161af2ce71c6ad91f7347383cd45872e0de2492db2586a09fe7d2bb5bbca7757b7f2b2c4b89a30a1023d1812b29e937d7ebb606b43b502047b030a8f43
-
SSDEEP
49152:O4/csNlzfLamxFm9gl1WeIunPf03FJYev12xe:OCcS1R26Bt83PvUx
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/2516-490-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
521f888251.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 521f888251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 521f888251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 521f888251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 521f888251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 521f888251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 521f888251.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
521f888251.exelll.exe340f27ffcb.exe2dd823c17b.exe8c05cbd067.exeskotes.exeskotes.exe5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 521f888251.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ lll.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 340f27ffcb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2dd823c17b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8c05cbd067.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 5508 chrome.exe 436 chrome.exe 4412 chrome.exe 3984 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
lll.exe2dd823c17b.exe5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exeskotes.exeskotes.exeskotes.exe521f888251.exe340f27ffcb.exe8c05cbd067.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion lll.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2dd823c17b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2dd823c17b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 521f888251.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 340f27ffcb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8c05cbd067.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 340f27ffcb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 521f888251.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion lll.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8c05cbd067.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exeskotes.exe340f27ffcb.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 340f27ffcb.exe -
Executes dropped EXE 11 IoCs
Processes:
skotes.exelll.exe340f27ffcb.exe2dd823c17b.exe8c05cbd067.exe34f9c5e67e.exe521f888251.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 3472 skotes.exe 2072 lll.exe 2516 340f27ffcb.exe 4952 2dd823c17b.exe 3624 8c05cbd067.exe 544 34f9c5e67e.exe 5008 521f888251.exe 316 skotes.exe 5484 service123.exe 4600 skotes.exe 1148 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
521f888251.exeskotes.exeskotes.exeskotes.exelll.exe340f27ffcb.exe2dd823c17b.exe5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe8c05cbd067.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 521f888251.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine lll.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 340f27ffcb.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2dd823c17b.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 8c05cbd067.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 5484 service123.exe 1148 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
521f888251.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 521f888251.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 521f888251.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\521f888251.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008316001\\521f888251.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2dd823c17b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008313001\\2dd823c17b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8c05cbd067.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008314001\\8c05cbd067.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\34f9c5e67e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008315001\\34f9c5e67e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008315001\34f9c5e67e.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exeskotes.exelll.exe340f27ffcb.exe2dd823c17b.exe8c05cbd067.exe521f888251.exeskotes.exeskotes.exepid process 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe 3472 skotes.exe 2072 lll.exe 2516 340f27ffcb.exe 4952 2dd823c17b.exe 3624 8c05cbd067.exe 5008 521f888251.exe 316 skotes.exe 4600 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exedescription ioc process File created C:\Windows\Tasks\skotes.job 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5764 2516 WerFault.exe 340f27ffcb.exe -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exetaskkill.exe5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exelll.exe2dd823c17b.exe34f9c5e67e.exe8c05cbd067.exetaskkill.exeservice123.exetaskkill.exetaskkill.exe521f888251.exeskotes.exe340f27ffcb.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2dd823c17b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 34f9c5e67e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c05cbd067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 521f888251.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 340f27ffcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exe340f27ffcb.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 340f27ffcb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 340f27ffcb.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2208 taskkill.exe 4680 taskkill.exe 3944 taskkill.exe 3648 taskkill.exe 3464 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exeskotes.exelll.exe340f27ffcb.exe2dd823c17b.exe8c05cbd067.exe34f9c5e67e.exe521f888251.exechrome.exeskotes.exeskotes.exepid process 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe 3472 skotes.exe 3472 skotes.exe 2072 lll.exe 2072 lll.exe 2516 340f27ffcb.exe 2516 340f27ffcb.exe 4952 2dd823c17b.exe 4952 2dd823c17b.exe 3624 8c05cbd067.exe 3624 8c05cbd067.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 5008 521f888251.exe 5008 521f888251.exe 5008 521f888251.exe 5008 521f888251.exe 5008 521f888251.exe 5508 chrome.exe 5508 chrome.exe 316 skotes.exe 316 skotes.exe 4600 skotes.exe 4600 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe521f888251.exechrome.exedescription pid process Token: SeDebugPrivilege 3464 taskkill.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 4680 taskkill.exe Token: SeDebugPrivilege 3944 taskkill.exe Token: SeDebugPrivilege 3648 taskkill.exe Token: SeDebugPrivilege 2872 firefox.exe Token: SeDebugPrivilege 2872 firefox.exe Token: SeDebugPrivilege 5008 521f888251.exe Token: SeShutdownPrivilege 5508 chrome.exe Token: SeCreatePagefilePrivilege 5508 chrome.exe Token: SeShutdownPrivilege 5508 chrome.exe Token: SeCreatePagefilePrivilege 5508 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe34f9c5e67e.exefirefox.exechrome.exepid process 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 544 34f9c5e67e.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe 5508 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
34f9c5e67e.exefirefox.exepid process 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 544 34f9c5e67e.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 2872 firefox.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe 544 34f9c5e67e.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 2872 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exeskotes.exe34f9c5e67e.exefirefox.exefirefox.exedescription pid process target process PID 336 wrote to memory of 3472 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe skotes.exe PID 336 wrote to memory of 3472 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe skotes.exe PID 336 wrote to memory of 3472 336 5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe skotes.exe PID 3472 wrote to memory of 2072 3472 skotes.exe lll.exe PID 3472 wrote to memory of 2072 3472 skotes.exe lll.exe PID 3472 wrote to memory of 2072 3472 skotes.exe lll.exe PID 3472 wrote to memory of 2516 3472 skotes.exe 340f27ffcb.exe PID 3472 wrote to memory of 2516 3472 skotes.exe 340f27ffcb.exe PID 3472 wrote to memory of 2516 3472 skotes.exe 340f27ffcb.exe PID 3472 wrote to memory of 4952 3472 skotes.exe 2dd823c17b.exe PID 3472 wrote to memory of 4952 3472 skotes.exe 2dd823c17b.exe PID 3472 wrote to memory of 4952 3472 skotes.exe 2dd823c17b.exe PID 3472 wrote to memory of 3624 3472 skotes.exe 8c05cbd067.exe PID 3472 wrote to memory of 3624 3472 skotes.exe 8c05cbd067.exe PID 3472 wrote to memory of 3624 3472 skotes.exe 8c05cbd067.exe PID 3472 wrote to memory of 544 3472 skotes.exe 34f9c5e67e.exe PID 3472 wrote to memory of 544 3472 skotes.exe 34f9c5e67e.exe PID 3472 wrote to memory of 544 3472 skotes.exe 34f9c5e67e.exe PID 544 wrote to memory of 3464 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3464 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3464 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 2208 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 2208 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 2208 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 4680 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 4680 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 4680 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3944 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3944 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3944 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3648 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3648 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 3648 544 34f9c5e67e.exe taskkill.exe PID 544 wrote to memory of 2324 544 34f9c5e67e.exe firefox.exe PID 544 wrote to memory of 2324 544 34f9c5e67e.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2324 wrote to memory of 2872 2324 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe PID 2872 wrote to memory of 4092 2872 firefox.exe firefox.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe"C:\Users\Admin\AppData\Local\Temp\5e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\1008303001\lll.exe"C:\Users\Admin\AppData\Local\Temp\1008303001\lll.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\1008308001\340f27ffcb.exe"C:\Users\Admin\AppData\Local\Temp\1008308001\340f27ffcb.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5508 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe4855cc40,0x7ffe4855cc4c,0x7ffe4855cc585⤵PID:5520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,14834571941481141207,10776456429639733622,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2000 /prefetch:25⤵PID:5808
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1868,i,14834571941481141207,10776456429639733622,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2020 /prefetch:35⤵PID:5816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2264,i,14834571941481141207,10776456429639733622,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2272 /prefetch:85⤵PID:5900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,14834571941481141207,10776456429639733622,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3228 /prefetch:15⤵
- Uses browser remote debugging
PID:4412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3236,i,14834571941481141207,10776456429639733622,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3276 /prefetch:15⤵
- Uses browser remote debugging
PID:436
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4180,i,14834571941481141207,10776456429639733622,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4500 /prefetch:15⤵
- Uses browser remote debugging
PID:3984
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5700
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 17684⤵
- Program crash
PID:5764
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008313001\2dd823c17b.exe"C:\Users\Admin\AppData\Local\Temp\1008313001\2dd823c17b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4952
-
-
C:\Users\Admin\AppData\Local\Temp\1008314001\8c05cbd067.exe"C:\Users\Admin\AppData\Local\Temp\1008314001\8c05cbd067.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\1008315001\34f9c5e67e.exe"C:\Users\Admin\AppData\Local\Temp\1008315001\34f9c5e67e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1888 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2887bbe4-0b35-4a78-922a-c3e017147048} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" gpu6⤵PID:4092
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2480 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc3e2e81-9bd9-4571-93af-ac17d47b106a} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" socket6⤵PID:4296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3120 -childID 1 -isForBrowser -prefsHandle 3360 -prefMapHandle 3080 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {32a83b2a-ad09-4a2e-a1f3-b59812bd5731} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab6⤵PID:1536
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3972 -childID 2 -isForBrowser -prefsHandle 3496 -prefMapHandle 3508 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {51df6ee6-0a92-411f-b279-83434a3bf591} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab6⤵PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1148 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4596 -prefMapHandle 4592 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6896f5f9-e524-4560-becb-3c458dc50ea2} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" utility6⤵
- Checks processor information in registry
PID:4816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5104 -childID 3 -isForBrowser -prefsHandle 5112 -prefMapHandle 5116 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {147d88d1-16cc-4a4f-a57c-f1f557e63969} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab6⤵PID:5712
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5228 -childID 4 -isForBrowser -prefsHandle 5236 -prefMapHandle 5240 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4701ad85-2fff-4ff3-8f8b-e64e16c803b8} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab6⤵PID:5724
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 5 -isForBrowser -prefsHandle 5520 -prefMapHandle 5516 -prefsLen 26944 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c793a027-3a52-4a93-b98a-6a5d68009b11} 2872 "\\.\pipe\gecko-crash-server-pipe.2872" tab6⤵PID:5736
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008316001\521f888251.exe"C:\Users\Admin\AppData\Local\Temp\1008316001\521f888251.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5008
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:316
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2516 -ip 25161⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4600
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\activity-stream.discovery_stream.json.tmp
Filesize28KB
MD5afbf60a845e6ba26dd356ff2c425844c
SHA19c46b700b24810785afdb8a6197ca04b1338393f
SHA2566dba8928793ac15e13ad429c292fb72bf5c9d676b0645feeebc2676427721862
SHA512a16fad33646571bba35bfb0ee327a2527c841f37eadcc0c283f0dd6eb0ed1374f392482bd5e37246d733e70b0f97bd2a898c8978af2409fe0e49306d45bf20fe
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5e97e7be58aa86224cf0f2d9fad9cda57
SHA1d9e39d873a7ffd5a9443a2c1aa4fcb1b636f018b
SHA2564e7dbc24bc556ccb8870848fd1eab36bfc682bab2463e132e50323be48bf5e75
SHA5125e79a723161e5e7b8c87510bf2349e44afd84ccceb420c129c5c29cb4323ea3c8f91078f510a3649bfe1d1764c325b1f4214fbb731cf79908e43a498c1cde2b0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5eba4366d3ad035997ca2018717594219
SHA117f071e423722516c99ca925fb9f27cb94ff12fa
SHA25600937905d5e38d34382b591df276ce27671cd0460b5ab9109e77179e7cd83b5f
SHA512aa426eb05cb2a942a460446a50542b7ec60104727929a2296025e8061487d1a03112a1842ab4d076394d7510c480d3e790dfd338ab0a25b5809e9349f70ff61d
-
Filesize
1.8MB
MD5ef791b7d99a63481993ad96a9f043e71
SHA115797d3eb2e5104cb3a518aed8df3f77fdda010d
SHA2569097b54392451d73b37577c5f606e5959c62deab4f359cf671adc62897452b49
SHA51259897ef989594b8261fe0ce15515e1784f8943155c672dc68247412a6afd888723114c581b5adac5df1c469d1a6ba12f3a9d3e9c79a3b2095acd0801e82c3377
-
Filesize
4.2MB
MD50b6b622de253d8ebab387a924f7735d2
SHA12922b01435ec24a0090eb9266051ec714cdbd431
SHA256e5f29348bc07584a7e370c5adafa376137382bfbfd5b5ee042e5ca27d013adf0
SHA512bb1e138a025aae83698af5513783ab67109978cb1619ab13a1bf177f9c0403c2e315d74c16a5f8a9fa8326e46824f728f0ef2fe1eac43e093719db14c96f3738
-
Filesize
1.7MB
MD5e14b1d1a382de6bf1de7a72d3c920957
SHA193b048727b7d1ae6eeb674b6b23930c8a57003d3
SHA256672c23cd3376b2b861cb82e629a9782de2f8d7b3a3e763584fdf15335b893388
SHA51240e57d7e063fa77ed50f346bd07e48f05996ddc02145e181715610fe4c32d40780f37d69de83c6fe66c1253e7edbadfb51bed29ae98b3d94fcaf9628cbb06b13
-
Filesize
1.7MB
MD53e8560a258080a7b0e6bd518ed854bcc
SHA11872b7e75f4ef1fdcbc6c69f5b0d9b5796bf0c33
SHA2569b2ec7d7ac54c11be4f7474488566ac029c02c366a8319bbb8182954ea1cfffd
SHA512ee9cddbd5218602ee0c5b9b151bb7d28cbf9394f4e6894d65e47df7e4a58eb7c312e8da384fae65d17ca6f82b39621707536b7fd53da2b19d994f96183660ebb
-
Filesize
900KB
MD5b757671f9a2f4e4e3e523dc59f208f13
SHA1fe68596fc782e576eb534394bd4e776f80cad3a5
SHA25605d02b91daed07cc67621e5507e2b12905dff93be2742c3b77a6335edbf15ee2
SHA51218fbf0ab9ce709188c891bced0406223a7ca18ebdf2eb53d19c2354ed4e39abf6fbdf23d11d9c4fbaa3bbc8276d60c00fc8cb069dff1c43e3f5c02e5b2bc611a
-
Filesize
2.7MB
MD5b426a7e5c105c44ea54720fa1f87c1a0
SHA1a759f5ec7515c52dabc11b965f83dd2d54e230b6
SHA256df2b1bce6dfa4328fe00419f675a892ac342f5a0e452e3f531de9c5d9b400804
SHA512915ae6e6a6e591b94ed8b7cd9e1225e8164c50187bd9f803fe8ec61e737f3529bcfb88437e73db5750fd79ac3dcce81d5b873b15ad3fe6ba2e52b5d1b7befe83
-
Filesize
1.9MB
MD53204e7adeb4d554e74b4aeb310cc5939
SHA18a2a99bd088af5024c5b18f6cec3e7ec6cb460bc
SHA2565e25eba0727eb361d518125ef6bad9f834d4c7d91d35edb4b93ee0decaca6c12
SHA512699307161af2ce71c6ad91f7347383cd45872e0de2492db2586a09fe7d2bb5bbca7757b7f2b2c4b89a30a1023d1812b29e937d7ebb606b43b502047b030a8f43
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\AlternateServices.bin
Filesize11KB
MD56a2e4fd0779cd14bc297689048817829
SHA11a9a7ea889299e2828b4a5bd65b96a79f986e17d
SHA25686d7f9946934c7ee361f5a079dfbb5384c81b77c6603d672fddff0ef7ef9d0c8
SHA512a4b8ab707b437965b94a80432cc7b2658bbf03e3771a0b80c0c1846e08289494bd09866aa2b9ab1c3d255602b3b9a19798cbd81050c9860feba28130ce703b08
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD50852e34c3efebf49df3facac5dd81673
SHA1ff67c60d44988c87629f9d720138ff7414de333e
SHA256ef4319b6e4e9530891e87ee2b238ec757efbaa70993b44720303b92a9e1bf928
SHA512c1d7335f3ca6c382afaf8fba64214eb93903c7502465f1de3da44e560f0205c94ca5eddc9293d6edf75824d2313b691e9e89f8c7dde604d51548de1884dedf5c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD50b690ee7afcaad928b0d3f059fa4fd46
SHA1439777216c23509ca6d34cc4a4b1752b1173aeaa
SHA2563648208e14455175d197ea1113cda826ce0883b4d89efd664d3bde4bb7eb6853
SHA512695809bf332d4fd48a4505600393fcdb135aeeec0172125d8ae149bb1024577ae5e65fac881176ead29cd39368cff650c4f5696303a5eb69bed0cdbfaadf4e88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD59da1a96f6c3eb07bb95cb7b98425dfb1
SHA145736bd3e232a6809819798a8d3dd27fb5facd29
SHA25649bd9a12f61f8ceaa4cc41f5c0929e750a35b0e7a7da6f0a78301ac8cee28ed4
SHA5128905f166008be777234d2b6fa352cf2876e22bf8cba0925e7aed2728f3ed5541ac2f24028b26f3a7ab3bb00e972848998a9e482469b1c6a9363f859125795bed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD537004c06c907620eb71a21b8b5a66b06
SHA1c2e584614bd21de6a48e2fe45fd8ce2738c59172
SHA25694313288bc00bd58b2c7621be640ee7e48705eb7ffe245cd8fc5ce13db9eb0ac
SHA512dfb38dbbb6919a110aeeb99d9ccbaebe6230014a29a81250327e14d5ae496e988340c7261b7b9b72a0dcce9a9f131f24a353219f77838957114440d6eca05bba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\ad2c9890-6a4d-43c6-ad77-d7ac03f1b0d5
Filesize659B
MD541cfcdf5a0251cf25b65d6f68e789226
SHA108b9e5a7266b2c17b876f8e10c2b923b32469912
SHA25610f83d539455dfd7bdd0c3668d7030850689eeb6faf42c25ee65b56d9d15fcbf
SHA5121a99139e01ad7d7d5b08d97029cbc72f8efd98b2fd91a8c2415abbdae60572053fa62a6be1abd914f07c5683701b98f0c8ca07fab220849bf7cb54359234578b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\datareporting\glean\pending_pings\d62fd993-b7cf-4214-86d6-23a49fa57f4f
Filesize982B
MD5ecf79f54b4551cf2fe17dfaf0c49c601
SHA10f1def1c3b5ae0e97a254d8c2168c9e82ad03924
SHA256e365ea36bf59e4acb2d74a71a0d877069960ac5b8d3f74d9c0e0ee8952e224e3
SHA5128d8612c7f7ca24de28c9619c1c5075dc0b34860376bbe73d85812d864ebc7f594cb4907a9dfe4ead351c434be3e7501963a4a7905f2cdc7ddda889bf187d8b95
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\iz0mcgq4.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD57b29360e10c26953bae78a64e5fdda39
SHA18502a42996827e74a51645dbe88e42a685a2fa96
SHA25662215e823e9c412438df7d7438e37837041c9a432276e6b14d3f388f5f73f9d8
SHA512cd2573f6bf8fa5fb1c367dcd9c98465881d457ac9ea00f46786e8158c8a8ce0aab6f76220046a293551003848d067ada0c313ea0b5df0af8eeed71c216c4e35a
-
Filesize
12KB
MD5652054f706737c5def56db4ae03e96a9
SHA12c108f121c0f2abc38f5f8d2f5a965e1e60e96eb
SHA25657758933da68c14566910bae1a38edaafcf6c70ab8f2614bb8d69a3f2e676fbf
SHA5128332ebb831222153626c59448d12790304f87bf2660b212835685614efbb802d4fc8f91e54cdd18b73304ef53939a10286a0447907e0077072f2c72f87a651d7
-
Filesize
15KB
MD5582cbbed70fd9d07ece3e44f6d25fa22
SHA18cd7b5866ed817b023cbe4b704653f645a0fdb9a
SHA256e2c46acf26b5d286f62cbc46c40268f208d9eaa6aa23d680d2088d8b0703ee9d
SHA512cbc4c146a097ef0716227a20181348df287e32011938a4a0267f74aae23e7b2bd40daf6c6f40733d9be689f14f7668f6f9d8a739f00377ead6066df0e0f93e09
-
Filesize
10KB
MD588d7ecd83acbf1375df373b193ec3226
SHA14cf636c3e2e1cbaf3151f00e502d5d0438166958
SHA25625f4bd9da9b3d840a7c036b01047baf476620469aa8753274756e64d52dcfb7a
SHA512ef5e9cdcd232f48de368775c638b9e01c36b5dc5ab44c868c88ebe4d3bd224e063db420df4d6b179c760e710b8bafd14390846b53b01fece5b193285d3f2511e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e