Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2024 03:31
Static task
static1
General
-
Target
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe
-
Size
3.1MB
-
MD5
9a60bc49b318e09ef6f3c4a3201cfbf9
-
SHA1
940c75ffd50cc991b233f29c5136d1df8a02f433
-
SHA256
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865
-
SHA512
c21f3af34786b0fe19d191cb780d63e4567d5415800ddef020d5a2a75f64f9280596bb5f98d57b51073d9cb74ed3b354458a87785dc4dfe880195da2ef4a7b37
-
SSDEEP
98304:Eou0zuDl3DUcyQcN2k3/bk37CZ1Rdp39Hh:Eou0zuDl39LCZb3th
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/5440-3792-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
56a8fcdd1e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 56a8fcdd1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 56a8fcdd1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 56a8fcdd1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 56a8fcdd1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 56a8fcdd1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 56a8fcdd1e.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exe625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exeskotes.exeskotes.exe788e1adb2f.exe10c536af88.exe56a8fcdd1e.exe35460a5bee.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 788e1adb2f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 10c536af88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 56a8fcdd1e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 35460a5bee.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 460 chrome.exe 2292 chrome.exe 3408 chrome.exe 6060 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
35460a5bee.exe625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe788e1adb2f.exe56a8fcdd1e.exeskotes.exeskotes.exeskotes.exe10c536af88.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 35460a5bee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 788e1adb2f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 56a8fcdd1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 56a8fcdd1e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 35460a5bee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 10c536af88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 788e1adb2f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 10c536af88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exeskotes.exe35460a5bee.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 35460a5bee.exe -
Executes dropped EXE 10 IoCs
Processes:
skotes.exeskotes.exe788e1adb2f.exe10c536af88.exef17966d2ed.exe56a8fcdd1e.exe35460a5bee.exeDgMSV3E.exeskotes.exeservice123.exepid Process 3464 skotes.exe 4704 skotes.exe 1728 788e1adb2f.exe 212 10c536af88.exe 4808 f17966d2ed.exe 4340 56a8fcdd1e.exe 5440 35460a5bee.exe 5808 DgMSV3E.exe 2872 skotes.exe 2604 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exe788e1adb2f.exe10c536af88.exe56a8fcdd1e.exe35460a5bee.exeskotes.exe625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 788e1adb2f.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 10c536af88.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 56a8fcdd1e.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 35460a5bee.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe -
Loads dropped DLL 1 IoCs
Processes:
service123.exepid Process 2604 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
56a8fcdd1e.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 56a8fcdd1e.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 56a8fcdd1e.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\56a8fcdd1e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008613001\\56a8fcdd1e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\788e1adb2f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008610001\\788e1adb2f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\10c536af88.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008611001\\10c536af88.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f17966d2ed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008612001\\f17966d2ed.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x000a000000023bbe-153.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exeskotes.exeskotes.exe788e1adb2f.exe10c536af88.exe56a8fcdd1e.exe35460a5bee.exeskotes.exepid Process 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 3464 skotes.exe 4704 skotes.exe 1728 788e1adb2f.exe 212 10c536af88.exe 4340 56a8fcdd1e.exe 5440 35460a5bee.exe 2872 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe -
Processes:
powershell.exepowershell.exepowershell.exepid Process 4860 powershell.exe 772 powershell.exe 3332 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4592 5440 WerFault.exe 133 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
taskkill.exe35460a5bee.exeDgMSV3E.exe625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exepowershell.exef17966d2ed.exepowershell.exeschtasks.exe10c536af88.exetaskkill.exetaskkill.exeskotes.exetaskkill.exe56a8fcdd1e.exeservice123.exepowershell.exe788e1adb2f.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 35460a5bee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DgMSV3E.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f17966d2ed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10c536af88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 56a8fcdd1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 788e1adb2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe35460a5bee.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 35460a5bee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 35460a5bee.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 2024 taskkill.exe 1084 taskkill.exe 2868 taskkill.exe 3848 taskkill.exe 3096 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exeskotes.exeskotes.exepowershell.exepowershell.exe788e1adb2f.exe10c536af88.exef17966d2ed.exe56a8fcdd1e.exepowershell.exe35460a5bee.exeskotes.exechrome.exepid Process 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 3464 skotes.exe 3464 skotes.exe 4704 skotes.exe 4704 skotes.exe 4860 powershell.exe 4860 powershell.exe 772 powershell.exe 772 powershell.exe 1728 788e1adb2f.exe 1728 788e1adb2f.exe 212 10c536af88.exe 212 10c536af88.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4340 56a8fcdd1e.exe 4340 56a8fcdd1e.exe 3332 powershell.exe 3332 powershell.exe 3332 powershell.exe 4340 56a8fcdd1e.exe 4340 56a8fcdd1e.exe 4340 56a8fcdd1e.exe 5440 35460a5bee.exe 5440 35460a5bee.exe 2872 skotes.exe 2872 skotes.exe 460 chrome.exe 460 chrome.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 460 chrome.exe 460 chrome.exe 460 chrome.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
powershell.exepowershell.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exepowershell.exe56a8fcdd1e.exechrome.exedescription pid Process Token: SeDebugPrivilege 4860 powershell.exe Token: SeDebugPrivilege 772 powershell.exe Token: SeDebugPrivilege 2024 taskkill.exe Token: SeDebugPrivilege 1084 taskkill.exe Token: SeDebugPrivilege 2868 taskkill.exe Token: SeDebugPrivilege 3848 taskkill.exe Token: SeDebugPrivilege 3096 taskkill.exe Token: SeDebugPrivilege 1608 firefox.exe Token: SeDebugPrivilege 1608 firefox.exe Token: SeDebugPrivilege 3332 powershell.exe Token: SeDebugPrivilege 4340 56a8fcdd1e.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe Token: SeShutdownPrivilege 460 chrome.exe Token: SeCreatePagefilePrivilege 460 chrome.exe -
Suspicious use of FindShellTrayWindow 58 IoCs
Processes:
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exef17966d2ed.exefirefox.exechrome.exepid Process 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe 460 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
Processes:
f17966d2ed.exefirefox.exepid Process 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 1608 firefox.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe 4808 f17966d2ed.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 1608 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exeskotes.exef17966d2ed.exefirefox.exefirefox.exedescription pid Process procid_target PID 4060 wrote to memory of 3464 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 83 PID 4060 wrote to memory of 3464 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 83 PID 4060 wrote to memory of 3464 4060 625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe 83 PID 3464 wrote to memory of 4860 3464 skotes.exe 92 PID 3464 wrote to memory of 4860 3464 skotes.exe 92 PID 3464 wrote to memory of 4860 3464 skotes.exe 92 PID 3464 wrote to memory of 772 3464 skotes.exe 96 PID 3464 wrote to memory of 772 3464 skotes.exe 96 PID 3464 wrote to memory of 772 3464 skotes.exe 96 PID 3464 wrote to memory of 1728 3464 skotes.exe 101 PID 3464 wrote to memory of 1728 3464 skotes.exe 101 PID 3464 wrote to memory of 1728 3464 skotes.exe 101 PID 3464 wrote to memory of 212 3464 skotes.exe 103 PID 3464 wrote to memory of 212 3464 skotes.exe 103 PID 3464 wrote to memory of 212 3464 skotes.exe 103 PID 3464 wrote to memory of 4808 3464 skotes.exe 104 PID 3464 wrote to memory of 4808 3464 skotes.exe 104 PID 3464 wrote to memory of 4808 3464 skotes.exe 104 PID 4808 wrote to memory of 2024 4808 f17966d2ed.exe 105 PID 4808 wrote to memory of 2024 4808 f17966d2ed.exe 105 PID 4808 wrote to memory of 2024 4808 f17966d2ed.exe 105 PID 4808 wrote to memory of 1084 4808 f17966d2ed.exe 107 PID 4808 wrote to memory of 1084 4808 f17966d2ed.exe 107 PID 4808 wrote to memory of 1084 4808 f17966d2ed.exe 107 PID 4808 wrote to memory of 2868 4808 f17966d2ed.exe 109 PID 4808 wrote to memory of 2868 4808 f17966d2ed.exe 109 PID 4808 wrote to memory of 2868 4808 f17966d2ed.exe 109 PID 4808 wrote to memory of 3848 4808 f17966d2ed.exe 111 PID 4808 wrote to memory of 3848 4808 f17966d2ed.exe 111 PID 4808 wrote to memory of 3848 4808 f17966d2ed.exe 111 PID 4808 wrote to memory of 3096 4808 f17966d2ed.exe 113 PID 4808 wrote to memory of 3096 4808 f17966d2ed.exe 113 PID 4808 wrote to memory of 3096 4808 f17966d2ed.exe 113 PID 4808 wrote to memory of 3332 4808 f17966d2ed.exe 115 PID 4808 wrote to memory of 3332 4808 f17966d2ed.exe 115 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 3332 wrote to memory of 1608 3332 firefox.exe 116 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 PID 1608 wrote to memory of 1692 1608 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe"C:\Users\Admin\AppData\Local\Temp\625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008608041\J2W0oF3.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008609041\EM2BsXU.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\1008610001\788e1adb2f.exe"C:\Users\Admin\AppData\Local\Temp\1008610001\788e1adb2f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1728
-
-
C:\Users\Admin\AppData\Local\Temp\1008611001\10c536af88.exe"C:\Users\Admin\AppData\Local\Temp\1008611001\10c536af88.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
C:\Users\Admin\AppData\Local\Temp\1008612001\f17966d2ed.exe"C:\Users\Admin\AppData\Local\Temp\1008612001\f17966d2ed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b2d5fb6b-7f2d-4f9e-aaa3-6eed781ee9ca} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" gpu6⤵PID:1692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {43e1dac2-ae63-4794-8317-1ef487b0e5c6} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" socket6⤵PID:3704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3256 -childID 1 -isForBrowser -prefsHandle 3272 -prefMapHandle 3336 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0d2bafd4-33b9-4b80-91f6-bcb20302ba57} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" tab6⤵PID:4836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2772 -childID 2 -isForBrowser -prefsHandle 3664 -prefMapHandle 3660 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63350054-2ab3-4a1a-a591-c59500f2b26b} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" tab6⤵PID:4440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4720 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4712 -prefMapHandle 4728 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4433af44-0b46-46f8-a2c2-40aef2afb473} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" utility6⤵
- Checks processor information in registry
PID:840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5548 -childID 3 -isForBrowser -prefsHandle 5316 -prefMapHandle 5184 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ba32c393-3e05-4c3f-9fcc-e0b3407cbd1f} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" tab6⤵PID:6120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5700 -childID 4 -isForBrowser -prefsHandle 5688 -prefMapHandle 5316 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {54ac6479-6a48-43c2-916a-c7a522e8225e} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" tab6⤵PID:3212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5900 -childID 5 -isForBrowser -prefsHandle 5820 -prefMapHandle 5824 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1268 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55c6acd6-c012-43f3-b41d-1288af9a1082} 1608 "\\.\pipe\gecko-crash-server-pipe.1608" tab6⤵PID:4840
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008613001\56a8fcdd1e.exe"C:\Users\Admin\AppData\Local\Temp\1008613001\56a8fcdd1e.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\1008614041\wE2lFM5.ps1"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\1008616001\35460a5bee.exe"C:\Users\Admin\AppData\Local\Temp\1008616001\35460a5bee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5440 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:460 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffd3686cc40,0x7ffd3686cc4c,0x7ffd3686cc585⤵PID:5428
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2036,i,2156378453846365184,2552070163098489997,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2032 /prefetch:25⤵PID:1904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1808,i,2156378453846365184,2552070163098489997,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1948 /prefetch:35⤵PID:4584
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2304,i,2156378453846365184,2552070163098489997,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2320 /prefetch:85⤵PID:5800
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,2156378453846365184,2552070163098489997,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:2292
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,2156378453846365184,2552070163098489997,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:15⤵
- Uses browser remote debugging
PID:3408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4260,i,2156378453846365184,2552070163098489997,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4476 /prefetch:15⤵
- Uses browser remote debugging
PID:6060
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2604
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5440 -s 13284⤵
- Program crash
PID:4592
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe"C:\Users\Admin\AppData\Local\Temp\1008617001\DgMSV3E.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5808
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2872
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5956
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5440 -ip 54401⤵PID:1708
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50a2ef5ec5e6076f7ec35a75afa1d375c
SHA1a94f01c828bb71d2878db5b7c558a42ca6b3acf3
SHA256dc49fb99da5a69aa5134249df441f5cae54f32713af8139caed72f1b8ea6ec50
SHA512c5daf92897a7580c857ecc71fb3a6dc22df00868d278613f1a860e3c1bf3645e4ea22c95ba4703f530a2aabdd4a0ad11359a0f930256bbee8f9b3543f7466b44
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
356B
MD5ccf7b58558cd57e048b007c3dee05771
SHA147d760474a1a4e621276e93c479f8ce926c88022
SHA256a6627b8beabb8a452f71434093cc4cfafb89ab621d9cc87cf95b282e5d1b9433
SHA512f1a7a1079cdf893c626d37d600a28fb06e35b3fd5dbff39609d6a3e7a1ca1131fc998d77ded3e49a09959c16b07c2efc9ad8452af75b6242bc6d082bc13aba5b
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD54666e694410c1a33d538a0b3b82ca3e2
SHA14b140560845cdd1fb34e3da38f471a72c22bb553
SHA25605009169ab6cc4a335843293689e7a60ed744b9e36feef2eea6fb5ffc2db952e
SHA512c3d926ad2cf3518ded5bb6649db9f7ad6ca58ca9a13fe814f5339534707acb838892dec003fca569d67e09505c4c4f203b431b77c4f6f8eea5938f3f0a7bdf5e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD525a8b207ac3fac92d37e4b6eefd1e37c
SHA1004f2ef6885b03643b000ebf4b5668e7599d4050
SHA2569bd5f605b9ab23dedcfb9d7705467b6d3fb50eaf1aef96857243ea38e172dffb
SHA512ce4590ab2ead91a92c8f906242143c4df5d81672858675b27466ec86cdd830b864f72d448af655a85ed63045a5bbd7d50ca87c0a91ab0cf84015e85de2617bf6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\6ir3v68x.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD596dab20a8f18cec9e22783ba61ea478f
SHA14354925ab306bc5208d23f01529f000d7fc7c546
SHA256eb5f2cc0ea20b67e9931174e54d45441a222fd9df522b2f2ce0252d139b429da
SHA512027da56c3d87719aebeb8e396a95ff9aa8492dd71cd81877542856e7d37803fdb86976c7216c11d068005b5b53d239ec23733dfbdf7f3ba3b4135146aa845aa3
-
Filesize
612B
MD5e3eb0a1df437f3f97a64aca5952c8ea0
SHA17dd71afcfb14e105e80b0c0d7fce370a28a41f0a
SHA25638ffd4972ae513a0c79a8be4573403edcd709f0f572105362b08ff50cf6de521
SHA51243573b0cbaac6e2e1646e6217d2d10c40ad10b9db1f4492d6740545e793c891b5e39283a082896c0392b88eb319dfa9392421b1c89c094c9ce9f31b53d37ebaf
-
Filesize
1.8MB
MD564f25a20bc6a8730e6d230e5d63dac8e
SHA1f1c8a90fefc9e7789013cf9228827634ad8410f3
SHA256daa2f6c445600573a591de7b8ad352699dcc9ff8b5bd2e1a6f93dc373572ceae
SHA5124b0e9001c5304b3deee2dd463ab5d310cf61423d773983994167093299878f28833772a746336aaa583b036a7a6510051602bc2064f7df983ae5999aae487c87
-
Filesize
1.7MB
MD5d3fb62af150353d3cb05f84d328d5601
SHA198be84b348beaf1abb2a9327c5918322e840a274
SHA2563a0642019f4c38e2b2b89e00492dfa809723534f7753ce480e01482ca191b950
SHA512428034b57853c7b0a9e1fd47590f9816a53ef497cad88bba5bf1094a12089c2022ce75be1cfe760da9342ef8d3adb853d70d01fe05f2cc6622e9c6decb91d0aa
-
Filesize
900KB
MD54676050a0ef5a185953ab79d47cb8585
SHA1dec41077d44ded9ce6d7bcf29848ebf49a89b6fe
SHA256bba632ef9970be97837b7cd9fad3df8c7a0f8476cb2bb8805e1f05c6b5167fd0
SHA5123c5f5c50c9c75ebd664fe4b962f0b70791472f33e731dac34547aea673cd65253d31d51f146ad181ddd6bd173636ddf3d0768098d1ba1dd76d853f1e4d72e350
-
Filesize
2.6MB
MD5439e7c18eefd3d53793669e1c9575d84
SHA18d6cf9ea7bcecbce59a28430636f3a6920b97d85
SHA2560926fb4154569379a0a942b34acf902d259a7e8d89b0c033ca8858a5503e3965
SHA5125f75a4b985dc1d05772a03a3cac8283be54c1cea5a4a6a093796b260b44f8f0ce0549ad979b31c06ae1ea16dd29a5c742ced0fc7f849940c07009df48cd59df9
-
Filesize
4.2MB
MD5f35acf76c5ace4e007dc64fcde784dbe
SHA18c3fbdc41b3d357b06902049e2ad6f2e4d136344
SHA25686088c0dfa1761f1989204ae2d46a3a0b3defaf379a2ccd0b81b0067aae8ec07
SHA51281c0f7526b83b76e9dbf8fa1256baa0945df7337dc876f45b774651449ef98d776b371d0ec91ff771dad0e722bdb2358205bfeaefc5559e738da157111f3002a
-
Filesize
243KB
MD5b73ecb016b35d5b7acb91125924525e5
SHA137fe45c0a85900d869a41f996dd19949f78c4ec4
SHA256b3982e67820abc7b41818a7236232ce6de92689b76b6f152fab9ef302528566d
SHA5120bea9890dbcd3afd2889d0e7c0f2746995169e7b424f58d4998c50bc49d2b37d30f5bd1845d3079b25f9963af2b71f136719cbd9fda37f7b85874992096b3e1d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD59a60bc49b318e09ef6f3c4a3201cfbf9
SHA1940c75ffd50cc991b233f29c5136d1df8a02f433
SHA256625a809fbd5a74bf0a084034cca09bd347580fe5e93cce80db392cfc2a365865
SHA512c21f3af34786b0fe19d191cb780d63e4567d5415800ddef020d5a2a75f64f9280596bb5f98d57b51073d9cb74ed3b354458a87785dc4dfe880195da2ef4a7b37
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize18KB
MD586aa7f7331b3e373017e3e383aae48e6
SHA1c955646f299def5acc0ba4549a22af67d967524a
SHA256c290c099a736da5056a953870626a59e944f986fde61ab7e9b40dc18d1cddfea
SHA512282f4d5bfdf20d3479f84b4c92bedd642a9a518bb5b13f4a0fffc61a6e22506ac09b0420dd4875422484632014454669fcb1e071aa8968886229221434e28ef6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\AlternateServices.bin
Filesize10KB
MD5bf094604767b52318f16e583f01cac26
SHA1d7cd0fe5da5c6c67452095d6c31bc21d423b6261
SHA256184dcff48a445135e1178c63a5627ed010ae02ac640be3a201cc27f8ac4ba9d5
SHA512d327fd886645ae2b29719962ec6c5de6bd26fd5ec69fc08fb18755bb905a24b0904445d80c727f797a5f6f8ad983ac32de73a397435a47848e979fd7aa8b52bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5513a219a1f462838c0f67e313bcffa95
SHA11f7f0624162a131d5d1d32c881c8078e0c83e046
SHA2564981b9b6cabbd282cc59fdc13c653369b7c906464af155c5666d9f6618f61b77
SHA5128e2ed1808d9c7367b6e2b2cbac99d006d783c82f1cc73189d54d0e8e9d4caf615f8c2f562127899e5ca8b71132fb7403eef57119bb4ecf1972065495be6412ab
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD5aade1937bc0cb1bee1978771c9567233
SHA132240b9c826a45ffda55c097c93722d0f7cc1777
SHA2565dac4e234823dec8eb19dad030a4397adbe27ec050c0b5828b0d4f4f8243daa8
SHA51271b58c956e319d5fb58fa60f3c5afe64c908a6fc4608d5daaf9a9d01b35803034ebdd303e35b4aed95302842c37346a52f44dbde11f4839f5cd733ab4dd2f263
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD57b1ee7b38f96c44626450e8c485711dc
SHA1a79862646ff9aad0cbe12b65e7c27eca84cdf23a
SHA2564f52c291e2241ebd710df2a8b4a74a767af07feb2653658ae32bb1c1d76b7d1a
SHA512a7f1cf90d887544ccb2a338af4a9486e504e3c02d46603ace5a1d0bb562bfd6ff0284f27ab7fde2f98ce2afb9b3f3bb06b8cc3800fe6c8ef75834149e5b502e1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD518b78decb0361028537196911f2cc935
SHA1fe57426bf84ca7aaa71cf6f6889f8fdde167ecac
SHA2569e7f591ada8ee83bc5ec5c8e43e45447cd981f458881382e93d3e12c637bf267
SHA5128fb607bf0018e8363020dee155681bdfc04181f026b2d01310076186baf0751e4c73a0e7f0397ac1fe1dc155783611c29e284551357d3c2f254f906e7af0edd1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\6b30becd-96cc-4746-96b5-c5a3529604a4
Filesize982B
MD5270caaae4eeee6858c02e9e7ccf240dc
SHA12174a634baf7458a43a42de8fc027ccaaa243ecc
SHA256e7166f294be38738a9ced431e27cdd1d869d8cd811b3dc1ad9caf5e301898716
SHA512e0f4130efb6c1d757570bfe5f97f5a8503e9f7b729f38798cdb0cff8671f360bdd98c6426d7cf54c1de19e824288a6f511ca8f8ea3690b604e460c242d437be4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\datareporting\glean\pending_pings\c92f0379-639d-4d15-a6ae-5737e9612bf4
Filesize659B
MD5d52a92e671ece0ca1852e41358aac448
SHA1bc60880ae644273c656583b073e088555e680d35
SHA2562540eabbc2c9869eca4ba1f3aab98c83d43db2653c214ff8f6a63f7482f50dda
SHA512f6e63f940cf018e65c3e388041ba4a3adb411d04646a9097bc5145606a6758b32967ba5be08b08174d048ce7b8e4e43f8184ae431443703760914871ea6e82f8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6ir3v68x.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD50c57208235b8ee6927d73c3a4df4b142
SHA11aa9c3fb13e5f44b1d2fbd910de915eb68c6ac56
SHA25624e24103ab26124fc14956ccd295bfb9830e8db1c38c1ec72535cab8d377a4a0
SHA5120711bdacb25f35ac4e7d0d878620e871db68c50e913914e4d0be6988c0db3fe25fa718451528ee7623e9ed2c56dde956492d078f05d9b0e9b670fa835a9317cb
-
Filesize
15KB
MD5de46d91cad586315055e7593e75603bc
SHA129d4a75e423db4db8d64f40573c3f3d398acf273
SHA25690ce4f7d756b65753f27dc1b18486839b09d8be0510fab011a366e14a5a17a8c
SHA512fd631f08450629065bda0287c8afd03ff544751b6b990f81410c24a8fb4a0e4c8abde6c184ac2764a00b427025bee6e9884639faf68b4e93d3a500df05cab01c
-
Filesize
10KB
MD50ecd109f55aff51ae1e37ff762e1229c
SHA17c9ebdac16a2987812028efcbf95984f040deb70
SHA256eece310678a46d200688c3595b4fe6dbe727523d2df773aa5ff7923162b45ff1
SHA51223102a571a9f88528041dcd503ee37f607385877829f0f03ce3fd643c7ae4fc121ce67c28e93090c97b78a19bacb8be2886cc1376e8b7a67584c5775d6737b44
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e