Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 07:37
Static task
static1
General
-
Target
ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe
-
Size
7.0MB
-
MD5
5aa8039823a4649532de27a588ea0c40
-
SHA1
691ef9ea12fd2896f029ce0d915be4ffbc61fc22
-
SHA256
ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4
-
SHA512
402b9008ec9954fb39729060c9acc272239257fa515aea9cf4007d017af32400e5d90a07805897cf8582dd97a0a567627a5a471774f547332268ef2ee3df0018
-
SSDEEP
196608:QQxCihyKvHuLKasogv03fUrCsvobBRJ8bdH3sjQUHTSx0:QQxCihxO0v03myDJux3yQUzSx0
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/2900-146-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8eb7d367f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8eb7d367f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8eb7d367f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8eb7d367f9.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8eb7d367f9.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 11 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3R80I.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4e955b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8eb7d367f9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 315a3b9004.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2j3155.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1b7fba377e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1A05a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ bbf04640db.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 4436 chrome.exe 2068 chrome.exe 2120 chrome.exe 1356 chrome.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2j3155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1b7fba377e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4e955b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8eb7d367f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 315a3b9004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1A05a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion bbf04640db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3R80I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4e955b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion bbf04640db.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3R80I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8eb7d367f9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 315a3b9004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1A05a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2j3155.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1b7fba377e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 315a3b9004.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 1A05a6.exe -
Executes dropped EXE 15 IoCs
pid Process 2404 z6e99.exe 1212 t1E40.exe 4768 1A05a6.exe 2836 skotes.exe 1148 2j3155.exe 2832 bbf04640db.exe 208 1b7fba377e.exe 628 3R80I.exe 3468 4e955b.exe 1684 8eb7d367f9.exe 2900 315a3b9004.exe 2984 skotes.exe 1624 service123.exe 2008 skotes.exe 3992 service123.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2j3155.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3R80I.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 4e955b.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 8eb7d367f9.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 315a3b9004.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1A05a6.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine bbf04640db.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 1b7fba377e.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 1624 service123.exe 3992 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4e955b.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8eb7d367f9.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6e99.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" t1E40.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bbf04640db.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008965001\\bbf04640db.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1b7fba377e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008966001\\1b7fba377e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8eb7d367f9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1008968001\\8eb7d367f9.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 4768 1A05a6.exe 2836 skotes.exe 1148 2j3155.exe 2832 bbf04640db.exe 208 1b7fba377e.exe 628 3R80I.exe 3468 4e955b.exe 1684 8eb7d367f9.exe 2900 315a3b9004.exe 2984 skotes.exe 2008 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1A05a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4788 2900 WerFault.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbf04640db.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1b7fba377e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e955b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t1E40.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1A05a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315a3b9004.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language z6e99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2j3155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8eb7d367f9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3R80I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 315a3b9004.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 315a3b9004.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1904 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 4768 1A05a6.exe 4768 1A05a6.exe 2836 skotes.exe 2836 skotes.exe 1148 2j3155.exe 1148 2j3155.exe 2832 bbf04640db.exe 2832 bbf04640db.exe 208 1b7fba377e.exe 208 1b7fba377e.exe 628 3R80I.exe 628 3R80I.exe 3468 4e955b.exe 3468 4e955b.exe 3468 4e955b.exe 3468 4e955b.exe 1684 8eb7d367f9.exe 1684 8eb7d367f9.exe 1684 8eb7d367f9.exe 1684 8eb7d367f9.exe 2900 315a3b9004.exe 2900 315a3b9004.exe 2984 skotes.exe 2984 skotes.exe 4436 chrome.exe 4436 chrome.exe 2008 skotes.exe 2008 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 3468 4e955b.exe Token: SeDebugPrivilege 1684 8eb7d367f9.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe Token: SeShutdownPrivilege 4436 chrome.exe Token: SeCreatePagefilePrivilege 4436 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
pid Process 4768 1A05a6.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe 4436 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2404 4964 ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe 82 PID 4964 wrote to memory of 2404 4964 ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe 82 PID 4964 wrote to memory of 2404 4964 ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe 82 PID 2404 wrote to memory of 1212 2404 z6e99.exe 83 PID 2404 wrote to memory of 1212 2404 z6e99.exe 83 PID 2404 wrote to memory of 1212 2404 z6e99.exe 83 PID 1212 wrote to memory of 4768 1212 t1E40.exe 84 PID 1212 wrote to memory of 4768 1212 t1E40.exe 84 PID 1212 wrote to memory of 4768 1212 t1E40.exe 84 PID 4768 wrote to memory of 2836 4768 1A05a6.exe 85 PID 4768 wrote to memory of 2836 4768 1A05a6.exe 85 PID 4768 wrote to memory of 2836 4768 1A05a6.exe 85 PID 1212 wrote to memory of 1148 1212 t1E40.exe 86 PID 1212 wrote to memory of 1148 1212 t1E40.exe 86 PID 1212 wrote to memory of 1148 1212 t1E40.exe 86 PID 2836 wrote to memory of 2832 2836 skotes.exe 92 PID 2836 wrote to memory of 2832 2836 skotes.exe 92 PID 2836 wrote to memory of 2832 2836 skotes.exe 92 PID 2836 wrote to memory of 208 2836 skotes.exe 95 PID 2836 wrote to memory of 208 2836 skotes.exe 95 PID 2836 wrote to memory of 208 2836 skotes.exe 95 PID 2404 wrote to memory of 628 2404 z6e99.exe 96 PID 2404 wrote to memory of 628 2404 z6e99.exe 96 PID 2404 wrote to memory of 628 2404 z6e99.exe 96 PID 4964 wrote to memory of 3468 4964 ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe 97 PID 4964 wrote to memory of 3468 4964 ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe 97 PID 4964 wrote to memory of 3468 4964 ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe 97 PID 2836 wrote to memory of 1684 2836 skotes.exe 98 PID 2836 wrote to memory of 1684 2836 skotes.exe 98 PID 2836 wrote to memory of 1684 2836 skotes.exe 98 PID 2836 wrote to memory of 2900 2836 skotes.exe 99 PID 2836 wrote to memory of 2900 2836 skotes.exe 99 PID 2836 wrote to memory of 2900 2836 skotes.exe 99 PID 2900 wrote to memory of 4436 2900 315a3b9004.exe 103 PID 2900 wrote to memory of 4436 2900 315a3b9004.exe 103 PID 4436 wrote to memory of 2656 4436 chrome.exe 104 PID 4436 wrote to memory of 2656 4436 chrome.exe 104 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105 PID 4436 wrote to memory of 5008 4436 chrome.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe"C:\Users\Admin\AppData\Local\Temp\ce49f2085ca6e01511919aa57073260b3d0367014967ca0f378705ada6a877d4N.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6e99.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6e99.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t1E40.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\t1E40.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1A05a6.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1A05a6.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\1008965001\bbf04640db.exe"C:\Users\Admin\AppData\Local\Temp\1008965001\bbf04640db.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\1008966001\1b7fba377e.exe"C:\Users\Admin\AppData\Local\Temp\1008966001\1b7fba377e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:208
-
-
C:\Users\Admin\AppData\Local\Temp\1008968001\8eb7d367f9.exe"C:\Users\Admin\AppData\Local\Temp\1008968001\8eb7d367f9.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Users\Admin\AppData\Local\Temp\1008969001\315a3b9004.exe"C:\Users\Admin\AppData\Local\Temp\1008969001\315a3b9004.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffcd955cc40,0x7ffcd955cc4c,0x7ffcd955cc588⤵PID:2656
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1884,i,16041882692971298022,11975176143771793557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1880 /prefetch:28⤵PID:5008
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2152,i,16041882692971298022,11975176143771793557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:38⤵PID:1924
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2256,i,16041882692971298022,11975176143771793557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2492 /prefetch:88⤵PID:2896
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3204,i,16041882692971298022,11975176143771793557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:18⤵
- Uses browser remote debugging
PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3428,i,16041882692971298022,11975176143771793557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3432 /prefetch:18⤵
- Uses browser remote debugging
PID:2120
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4216,i,16041882692971298022,11975176143771793557,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4212 /prefetch:18⤵
- Uses browser remote debugging
PID:1356
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1624
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1904
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 16007⤵
- Program crash
PID:4788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j3155.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2j3155.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1148
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3R80I.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3R80I.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e955b.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4e955b.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:3936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2900 -ip 29001⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3992
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
1.8MB
MD55032eea68452ff054956add942d03697
SHA1dc28bb50951074ec5d823e4bc94ba520796cc88f
SHA256940581abda4098f8858edda4080cff127a179db5c7ac9d6f357881569b703fdb
SHA5125f5b8377654f8722de23bb307739fd0f8c0970b9e62296462be9895a829558c47e709091b62f38c5f7e4b751b3ac066cd2ffe3da18bcd0f3a313855e1f06c666
-
Filesize
1.7MB
MD5195eafa20236c52b744d7ff88ccf8dd6
SHA1eb079dc207806442f57ef816f42f8b0a1835aa46
SHA256110760d0807d24cda6139d69aee2e1166753ad3ee33e4f9751f3c036903838b4
SHA512ed80f68b578faa2283bdd99e694e48eede8a98dbf94803e41134d0f9598eef032ae655be4582e492667daee2a4b46f5cec0c8083e653edd5eef828eadc1616a8
-
Filesize
2.7MB
MD52279cb27373137620622b50c8252e7f7
SHA16aa22e3f08223831d0fe1cd4c203314a4597ae82
SHA2565a046fdbee1b681fe3ea9fba1367efce36b3f6b6a88339651f93ce8496d1728b
SHA512b00d3f819833e8670c05ae36d7a1f18bfd6d7fcd78e07e7585cff262dc82b1fc4185200664cf35b63e403c618e45f0555ef7755ead5afde810c594d61a121f98
-
Filesize
4.2MB
MD588d3b1255894e7039c67b2272b3386df
SHA184fd4519dbb0270ca681451ca7092b8e803677bf
SHA256ec85e681b765cf685363a2aa3a5b8a86837d0d8923d2ecba7b35e67d74b29265
SHA512c6f51d6ca7e9002a4a7806d347f91b3a17d70926a9d34971a07a40fe2121593469ae8388c47f0c2abbc9f3e29329f39b01ca7a07fd5b55c2d86260d4f4d514ac
-
Filesize
2.6MB
MD5a0b198a5fd53cfff7e90ad121b4c40a7
SHA191ffbf7e61f3fe5b8fea9edc95c0a07eac19d842
SHA25654fba3007a5aa7435b178f3ed61e22f3643c9fdd49cb845290ff15be84dc58b3
SHA512da04642e10465d16a44ba12d4262804bbf4a7ac40591cadcc550c7d6008c6acaeb6a5ef5646bd0dfdbb071ce66929bd1d6cb65be8df2a538740e8ca196e7297c
-
Filesize
5.5MB
MD5de35fdd810dcca66025a7cf610dadbc4
SHA127f5b031954c821929107c492b59947484225556
SHA256197df9aae5d05ce40a3cf1c4492d11ac89b9a84085b61a20cd5f037d147ce232
SHA51212f2e654d1f93e1f2a417861ec8e1912b371cef3d622f8c5d5c367e298b5b9c74715bd96f88e7993d3ca6c8f0423f61b809755b7b5d55b705e8550de2ae33689
-
Filesize
1.7MB
MD5ed06943d9d911219cd6f78939799044b
SHA150aa51c40a252a5ba8a387413c469fb110ca13be
SHA2563f6b3352787de33b73d5248a1a21575fb674094cd80082665ec9a3894d312aaf
SHA5122f05d1b8328bf6178dffaa6941106496e1dfd53a8ad793ac236d3aa98f5332c5cc4250552a10f566af563e072bb0e7506007f6aac26bf44bbfab963269500ce2
-
Filesize
3.7MB
MD52323bb30459e787a1e7338e0f07830ff
SHA1bdd2801171646abe74b63e883e6d395ef5cff4f5
SHA256d9b6d81b2a29a55e96d65085827753e4690bf3aa6bf3a2c9732f78bba51b7dce
SHA5125fba0d5fd5b939a198afef040b3d4c23eecca63a7d1365cb2cdc6c3ab6e9badef24acc96d3c2380d5738792aa3a7b3794317909ef8595fe5fae70613d3ac58c7
-
Filesize
1.8MB
MD568c848d7232e6525935d7e337f37d624
SHA16cef0f74d1fbb478d975eaf516a881c3fd833b15
SHA2566a2a807045211bc2015ebcb5c40940f3111084d1a97b8d12560ee4f140825cc3
SHA5121aac64871ab488cbf1ca2c17c591fb9780291435a7464a956e19d9bf78a58d3800b7955a8fc7d9c7a2efd7f83e2bd65d05bf0ecfcbdce9c1e0bbb847eac79310
-
Filesize
1.8MB
MD5de0479866482075eead948de5ed353ef
SHA1817c54ba06830e3fa579bb53b21d95ce2af37e80
SHA256508dc6038db822c21cce37bc9aac1694637abe532b5edf89942a829074639e0d
SHA5129bd2cf13a30cdc2836fa82ec056db9ca0c9f94ce7e1d0446d0a72e1d3b985c09ba2aeaf5099ad79eb8450c68e76c01aeca03cf6a1715d5cad6eeac7280b7f2f3