Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2024 02:12
Static task
static1
Behavioral task
behavioral1
Sample
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe
Resource
win7-20240903-en
General
-
Target
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe
-
Size
1.8MB
-
MD5
82d65703f59b88d8f091de327bbabce4
-
SHA1
07580dac62ef9478a94f1a316616f15c9d0a9f13
-
SHA256
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3
-
SHA512
3471a3a1acb124cce0219d9330b46549a560f0b99dc8e3ca216b449ee4a0e93d3e1f0963e725a143faca932cfc0ba804e7724b836e3c185d6fda39c03d19671f
-
SSDEEP
49152:5BXUShjURElo/e6Lk5PfzHLR4nTsD2g02q2fMypj8xok0gPC/4KPRr6:fX9h/PPfx4nTsigA2f5pj8WXNAKI
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/1196-59-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
4dd586417e.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4dd586417e.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4dd586417e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4dd586417e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4dd586417e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4dd586417e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4dd586417e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
91059f68c9.exee1a316176e.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe54eab7982d.exe4dd586417e.exeskotes.exeskotes.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 91059f68c9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e1a316176e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54eab7982d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4dd586417e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 2160 chrome.exe 2888 chrome.exe 4520 chrome.exe 5016 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe91059f68c9.exeskotes.exeskotes.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe54eab7982d.exeskotes.exe4dd586417e.exee1a316176e.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 91059f68c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54eab7982d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4dd586417e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54eab7982d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 91059f68c9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e1a316176e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e1a316176e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4dd586417e.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exe54eab7982d.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 54eab7982d.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exe54eab7982d.exe91059f68c9.exee1a316176e.exeskotes.exee662d75abc.exe4dd586417e.exeservice123.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 1092 skotes.exe 1196 54eab7982d.exe 2700 91059f68c9.exe 1848 e1a316176e.exe 3924 skotes.exe 1380 e662d75abc.exe 1052 4dd586417e.exe 5484 service123.exe 5992 skotes.exe 3312 service123.exe 5920 skotes.exe 4588 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
54eab7982d.exe91059f68c9.exe4dd586417e.exeskotes.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exee1a316176e.exeskotes.exeskotes.exeskotes.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 54eab7982d.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 91059f68c9.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 4dd586417e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine e1a316176e.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe -
Loads dropped DLL 3 IoCs
Processes:
service123.exeservice123.exeservice123.exepid process 5484 service123.exe 3312 service123.exe 4588 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
4dd586417e.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4dd586417e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4dd586417e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\91059f68c9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008322001\\91059f68c9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e1a316176e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008323001\\e1a316176e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\e662d75abc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008324001\\e662d75abc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\4dd586417e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008325001\\4dd586417e.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008324001\e662d75abc.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exe54eab7982d.exe91059f68c9.exee1a316176e.exeskotes.exe4dd586417e.exeskotes.exeskotes.exepid process 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 1092 skotes.exe 1196 54eab7982d.exe 2700 91059f68c9.exe 1848 e1a316176e.exe 3924 skotes.exe 1052 4dd586417e.exe 5992 skotes.exe 5920 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exedescription ioc process File created C:\Windows\Tasks\skotes.job 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5780 1196 WerFault.exe 54eab7982d.exe -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exe4dd586417e.exeschtasks.exe54eab7982d.exee1a316176e.exetaskkill.exeservice123.exe27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exetaskkill.exetaskkill.exetaskkill.exe91059f68c9.exee662d75abc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4dd586417e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54eab7982d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1a316176e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91059f68c9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e662d75abc.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe54eab7982d.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 54eab7982d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 54eab7982d.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 616 taskkill.exe 3648 taskkill.exe 2908 taskkill.exe 3112 taskkill.exe 3732 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exe54eab7982d.exe91059f68c9.exee1a316176e.exeskotes.exee662d75abc.exe4dd586417e.exechrome.exeskotes.exeskotes.exepid process 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 1092 skotes.exe 1092 skotes.exe 1196 54eab7982d.exe 1196 54eab7982d.exe 2700 91059f68c9.exe 2700 91059f68c9.exe 1848 e1a316176e.exe 1848 e1a316176e.exe 3924 skotes.exe 3924 skotes.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1052 4dd586417e.exe 1052 4dd586417e.exe 2160 chrome.exe 2160 chrome.exe 1052 4dd586417e.exe 1052 4dd586417e.exe 1052 4dd586417e.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 5992 skotes.exe 5992 skotes.exe 5920 skotes.exe 5920 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exechrome.exe4dd586417e.exefirefox.exedescription pid process Token: SeDebugPrivilege 3732 taskkill.exe Token: SeDebugPrivilege 616 taskkill.exe Token: SeDebugPrivilege 3648 taskkill.exe Token: SeDebugPrivilege 2908 taskkill.exe Token: SeDebugPrivilege 3112 taskkill.exe Token: SeShutdownPrivilege 2160 chrome.exe Token: SeCreatePagefilePrivilege 2160 chrome.exe Token: SeDebugPrivilege 1052 4dd586417e.exe Token: SeDebugPrivilege 1184 firefox.exe Token: SeDebugPrivilege 1184 firefox.exe -
Suspicious use of FindShellTrayWindow 60 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exee662d75abc.exechrome.exefirefox.exepid process 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 2160 chrome.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1380 e662d75abc.exe 1380 e662d75abc.exe -
Suspicious use of SendNotifyMessage 32 IoCs
Processes:
e662d75abc.exefirefox.exepid process 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1380 e662d75abc.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1184 firefox.exe 1380 e662d75abc.exe 1380 e662d75abc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 1184 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exeskotes.exee662d75abc.exe54eab7982d.exechrome.exedescription pid process target process PID 3968 wrote to memory of 1092 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe skotes.exe PID 3968 wrote to memory of 1092 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe skotes.exe PID 3968 wrote to memory of 1092 3968 27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe skotes.exe PID 1092 wrote to memory of 1196 1092 skotes.exe 54eab7982d.exe PID 1092 wrote to memory of 1196 1092 skotes.exe 54eab7982d.exe PID 1092 wrote to memory of 1196 1092 skotes.exe 54eab7982d.exe PID 1092 wrote to memory of 2700 1092 skotes.exe 91059f68c9.exe PID 1092 wrote to memory of 2700 1092 skotes.exe 91059f68c9.exe PID 1092 wrote to memory of 2700 1092 skotes.exe 91059f68c9.exe PID 1092 wrote to memory of 1848 1092 skotes.exe e1a316176e.exe PID 1092 wrote to memory of 1848 1092 skotes.exe e1a316176e.exe PID 1092 wrote to memory of 1848 1092 skotes.exe e1a316176e.exe PID 1092 wrote to memory of 1380 1092 skotes.exe e662d75abc.exe PID 1092 wrote to memory of 1380 1092 skotes.exe e662d75abc.exe PID 1092 wrote to memory of 1380 1092 skotes.exe e662d75abc.exe PID 1380 wrote to memory of 3732 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3732 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3732 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 616 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 616 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 616 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3648 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3648 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3648 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 2908 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 2908 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 2908 1380 e662d75abc.exe taskkill.exe PID 1196 wrote to memory of 2160 1196 54eab7982d.exe chrome.exe PID 1196 wrote to memory of 2160 1196 54eab7982d.exe chrome.exe PID 2160 wrote to memory of 5088 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 5088 2160 chrome.exe chrome.exe PID 1092 wrote to memory of 1052 1092 skotes.exe 4dd586417e.exe PID 1092 wrote to memory of 1052 1092 skotes.exe 4dd586417e.exe PID 1092 wrote to memory of 1052 1092 skotes.exe 4dd586417e.exe PID 1380 wrote to memory of 3112 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3112 1380 e662d75abc.exe taskkill.exe PID 1380 wrote to memory of 3112 1380 e662d75abc.exe taskkill.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe PID 2160 wrote to memory of 4252 2160 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe"C:\Users\Admin\AppData\Local\Temp\27078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\1008317001\54eab7982d.exe"C:\Users\Admin\AppData\Local\Temp\1008317001\54eab7982d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff98236cc40,0x7ff98236cc4c,0x7ff98236cc585⤵PID:5088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1920,i,9987961449769291887,3093886307244699059,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1912 /prefetch:25⤵PID:4252
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,9987961449769291887,3093886307244699059,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2180 /prefetch:35⤵PID:464
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2228,i,9987961449769291887,3093886307244699059,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2328 /prefetch:85⤵PID:3992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,9987961449769291887,3093886307244699059,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3196 /prefetch:15⤵
- Uses browser remote debugging
PID:4520
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3168,i,9987961449769291887,3093886307244699059,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4468,i,9987961449769291887,3093886307244699059,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4544 /prefetch:15⤵
- Uses browser remote debugging
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5572
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1196 -s 17644⤵
- Program crash
PID:5780
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008322001\91059f68c9.exe"C:\Users\Admin\AppData\Local\Temp\1008322001\91059f68c9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2700
-
-
C:\Users\Admin\AppData\Local\Temp\1008323001\e1a316176e.exe"C:\Users\Admin\AppData\Local\Temp\1008323001\e1a316176e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1848
-
-
C:\Users\Admin\AppData\Local\Temp\1008324001\e662d75abc.exe"C:\Users\Admin\AppData\Local\Temp\1008324001\e662d75abc.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:616
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4816
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1984 -parentBuildID 20240401114208 -prefsHandle 1904 -prefMapHandle 1896 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c8ce5f57-9441-446a-85cc-a9eea31d35b0} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" gpu6⤵PID:448
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2444 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3f365f0-9f85-4728-baaa-d77d911f28dd} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" socket6⤵PID:2372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3016 -childID 1 -isForBrowser -prefsHandle 3020 -prefMapHandle 3056 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {fd96ad3b-4114-417f-873b-e0f4f3819fab} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" tab6⤵PID:1096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4156 -childID 2 -isForBrowser -prefsHandle 4140 -prefMapHandle 4132 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d6eda816-1b1b-45c2-828f-5fa8563df166} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" tab6⤵PID:4224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4892 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4648 -prefMapHandle 4492 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {09519155-6e62-41f7-81da-f27eb0028fab} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" utility6⤵
- Checks processor information in registry
PID:5436
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5384 -childID 3 -isForBrowser -prefsHandle 5376 -prefMapHandle 5196 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a8731083-f05b-4897-b3eb-f46105b61a42} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" tab6⤵PID:2292
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5508 -childID 4 -isForBrowser -prefsHandle 5516 -prefMapHandle 5524 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54b62acb-2de6-4b1f-abbc-8d48e378336e} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" tab6⤵PID:3896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5716 -childID 5 -isForBrowser -prefsHandle 5796 -prefMapHandle 5792 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1264 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c402df02-5afb-4904-b137-454c54c0c309} 1184 "\\.\pipe\gecko-crash-server-pipe.1184" tab6⤵PID:3536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008325001\4dd586417e.exe"C:\Users\Admin\AppData\Local\Temp\1008325001\4dd586417e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3924
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:896
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1196 -ip 11961⤵PID:5652
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5992
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3312
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5920
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4588
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json
Filesize28KB
MD55186513cc12cf61ff8be0b13716a36d8
SHA173bf1f04a4f0d2e60312beb2ddcc68e45b76b0f9
SHA2560818a4869ba6fd3863231a668cbca2b7dc4378d05799c040f22da6869fcab3b8
SHA51287fa88306e812a46905fe772f9accbd43720221254f1d206e766fd8d758d6ac965d7d0feba448d15ecc78e91011583c19fbcf558a7bf88fbeb7a44aaff0e80a8
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5e317d48d45eddd8b8e9983f4e8069d9d
SHA1001303ce2448863cbf2ecca1c7d97940973e952e
SHA2561875f5cefee000dc051f08747ace2e3c00ab4ea5ce8ee0e1b3f7b32d93439a78
SHA512def37e0fc475543d41193313a885e4049b2fd061e528e5a46283bdee7e3a7049f1ad4dc4da93e25d9db4d6b2613e432c3f38ec467f2cd58f33792e6ed7daf7a7
-
Filesize
4.2MB
MD50b6b622de253d8ebab387a924f7735d2
SHA12922b01435ec24a0090eb9266051ec714cdbd431
SHA256e5f29348bc07584a7e370c5adafa376137382bfbfd5b5ee042e5ca27d013adf0
SHA512bb1e138a025aae83698af5513783ab67109978cb1619ab13a1bf177f9c0403c2e315d74c16a5f8a9fa8326e46824f728f0ef2fe1eac43e093719db14c96f3738
-
Filesize
1.8MB
MD5b70b1671baa5d6caaace25d7ddcd78fe
SHA12fed77301f8006ff0ee3470e2f6f0ddb6bc0f9af
SHA256a713de5a8e8414518a7927adae9edced07692a6428fef2fffd7f379de58cb83b
SHA512789051f3bbb5f5b2cb27340600d80939aba6162bef43be37490de2b517e825a2684a66fa9c0d800dea9d6a30f96d969c7b98a777a9bddafc0ee9c6cf10c6579a
-
Filesize
1.7MB
MD5c39eb549a7dc6f9f6eeababcaea602dc
SHA133c34ab34eb843e347694db102e68ae0b59d9c29
SHA256ebd45bb1a1f3c24ca2c7c4d9c30efe71eea9b8246a750bd5722043703013af99
SHA5128702781d879c22ef45362e0e539015670c3365724b519881ee6a7e10b241540080c196ddd52003b8395c338dbf8448485703b076e43c17e8466e41f41dc40ee4
-
Filesize
900KB
MD5013c3fb391228f0ae96123aafd47f414
SHA12e7c08f94b126b86e10315dab1106bc8f5adb543
SHA256fe3127cbef22a34c43d015948d1297044b01c8b8ed5a78169659ec5c83df92ae
SHA51294f8f33c6f37c0a2c2caabff912eed69854a0bae633075b5c3a598d9f8586983d9a14914c01a3586535f414311b262b7dad297b0a56e7ae80d74e0a559902c76
-
Filesize
2.6MB
MD53a635fef14102b754410ece391685b93
SHA1b427cb065492e71710d14e5c3fe04b5806bef5f6
SHA256467ae373cafb2e87b04974ff1ee6480931784e057bcd1e1a125b6a57e3e0ab2a
SHA5122ddcdfdad502065bb765de70021884429e7f6d1fb83f5981a7b714d4a0bd6b0bca345f9d555da6efc134df23b8f47b6eaec67e3a8542d7fc11b812ed94a84822
-
Filesize
1.8MB
MD582d65703f59b88d8f091de327bbabce4
SHA107580dac62ef9478a94f1a316616f15c9d0a9f13
SHA25627078da22468bc047da60bdfaf05b18f5d135d27ff58c655e7e9e474ce02e8d3
SHA5123471a3a1acb124cce0219d9330b46549a560f0b99dc8e3ca216b449ee4a0e93d3e1f0963e725a143faca932cfc0ba804e7724b836e3c185d6fda39c03d19671f
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD584a81bb55ca1374de2028f5b2eee155f
SHA1a5a3251335bd132a6d10a0271c03544105e06d79
SHA25678b5d9b0f2c54a63886c9b45bc5301f62b7e2076441fca56f9e53dc2ca3c8191
SHA512cadfae44f7709c8f672007c0065120bfe720431fcd776cab35d99d8beef818897a0a87fec95404a2f2ec4c320bd697a512188a9dfd4ac9a6bcff845db6440990
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD5557219cd28ec481870ae5e118476a7f8
SHA1f4b565aa00065af955f2776e037301ff0e9ccad2
SHA2566940cb91385fe188372ddb37970a358522f1633364d850f44260cb210e2b4814
SHA5127ed63bfbc49514ce56ee359138c45e998c3aad9937985a479052218e3267ecd0e9de9c88166487899c805064f4dd1e3ebe7ee1b9e383b6f1e76f573d2555641e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD58eedcd665ccd552ac49e14c93f0e87da
SHA1cfef395ad33cecce506f13fa1309701a198eda0e
SHA2567256e3d83d1393b7739506332fb542c3888c36816013def013f0954f3eea7922
SHA51295879759127bb90f7fbd2f0d2a455697a0000eb70890c81199c498dd2e8c350f7e2731644b48b8b56480a1d7d79adf71c32de468443fb07ea5316ad50a524da3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5c9055dac99d2ee9a38de41d0d820b7c3
SHA162acdd925b88c5dba3672d2ddd917cf2b23676bf
SHA256eb0f254c5a2f1b571cdd01d174857500b24a421aa24d9afecda7d75036466587
SHA512db116ed78958a73e2d7f9c1297999bce10d2167268ddb123b6ce4bb078398ba0bb408eb754df8d7d715687366f915ddfe92335b1c6329ef687858e20bfa5f6e7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize26KB
MD55b8abddaedc779a7d0fbeb5bc96f9af6
SHA13fbc465b51ab384b43b4e347cefea5c9ce8b5d09
SHA2560329212559c1237c922d7630eb699e47c4c34aead25551ddfe2449c7a2792a20
SHA512d15effe2c87fe4d7414a34bfe5aa514be79ec2f9ddfb0b97a7cc26add71d5034e1f873fa70bbcdf69aeb1c4cc06102739e402867d420850ee4d1f8ff28a71c4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD557c606544f2d459e6a56499f805b41e1
SHA1fefc381b0619aff5b9beecb6ad0f9cca58c621ec
SHA25636519393e07a673bcf3fddfc9a8c3b0c69a124aa07ce37945ffe27aec43ed617
SHA5126aeb4fa0596bdca5d14138fcc75346b563bb73ca3a2adb54823daed49cfcd2706fce1cc5d026b241c354ee36ee6e1d204d0a56061b635addf6b2f3251305472d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5ee87c9a6aa40d251deae33942648c632
SHA17e76198a1bcf9ebde82644f6204bafac7712c6a6
SHA256f42b5e4939f10883ce098bfdff97228b13983756fbb4b5e5e86b7defadaf4d62
SHA512f204c388827dc826d35f07ff19a3e4890d6cfc8ee24a52636b3172c2b3df60f411f6871fdb2c8cefc33da04a76ef3ca1164fa6ad0d0e7d3a096eeff44ca05032
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\6b7376e1-3a7b-4ca4-9632-3afe221d3bc0
Filesize982B
MD58cbce452f6ec17adc151c35d00983e16
SHA13941104e109e55882623c9573d21a2f1b711a0c8
SHA256b62a211885c1174b65396116185d8fa3baecb326e104f6afa155c7d355724510
SHA51288882aff405773492f3f6e7307a8f496a7287d93a931c45e24a3cdf31e851756fc6ccb00610ce6b3af97d7e15fdbd59c48e8e44f9534a3544e57827dab3007ba
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\aa56e411-e164-4e2d-ae31-4fca8a53f59a
Filesize659B
MD524f55fcad73613f238fdc59ab58646f1
SHA1f9bbb84153ee0fefee8c014e61dc706c12207db7
SHA256dad129ac4ed98967984d25846eabb6c285969a2a75d81c0a3f1f0b9e135b0c05
SHA512708be53d948f1fae024afbac071e47f6988cee113f353ccbeff6a37ec32382f6dc69ce5d24fa1fe3496184f2c77458ec5549ad09a7023725fd19bfab91f33993
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD5b865663e6217a5b8400870ec55e339d9
SHA1cf75a32917c4c6a6c910f276ba4e6d40482c9602
SHA2561903a1a847c0a951eeed07d55b48edc9f9366a4121c5dfd37cc31efe9b0ce587
SHA512689c957128945c0c0936538795cd96912204fd22473416e595ac32aa2ad04246b38ab72675eb00cbc48a9da0c8a689f8df664d3c9bd59e42bd41fe8157c82aed
-
Filesize
15KB
MD5ff9c09648e8538fefe2a9ddc53b142ff
SHA15bafbc338e02b7d9934083b7e1538ebc010e5eba
SHA256f3cf071ebc2027e89c4b9dcb50a4470c8e2cf9f5970a742a296be65d653fb9a0
SHA512710c06dae0dc998c27b90c67b11d5aa03cc3baa325fad05449202f055efec46f7fffa6ab1b37d5dcd47e2b306493eb7569560eee13e3e1a3681af302c3cde5dd
-
Filesize
10KB
MD58cdc6702c4362d15487adcb1778e8507
SHA14cf702d981d0993b0fc5bf7bbe60a6980dca4de6
SHA25646b02e83570b2a799a8364f99465c19c7bdaa262da2abadd2c625dfcaea464d7
SHA5128dc8b3a04538a1b25fc8b0aa1c1f1b00ad1c83f7adca9d570ac91306301e5f30e7e33f2342d84fa3a0a592e6dc6a1e19d335bbb5d187d7f85c47fdb5736c739b
-
Filesize
11KB
MD5cf1c31cef3b270383dbb4aa049e000a1
SHA11b3dc98208cf5934a7642706c8a798234b7c970b
SHA256e1e26391a636358ef8e75869e6f5d65fb7e9208ce0807a022a992b65cec38a86
SHA5124c1c71dba34ff3ae70d14681eff7d47f4a79fbf71c0201738d1334793040f8f4618a860ddebc305be8c61d832fdf4a958f80ed03554e699d79bb6ca05b674f5f
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e