Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 10:19
Static task
static1
Behavioral task
behavioral1
Sample
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe
Resource
win10v2004-20241007-en
General
-
Target
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe
-
Size
1.8MB
-
MD5
6c647887fa50b1e2b11f313871f854f9
-
SHA1
d267af26188dc62cbe2759f851c9abff765e130d
-
SHA256
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91
-
SHA512
78e82405f4249c39b8051faefe58eb77142a70815e1ece8b7a7a76f44362408aa3aa4fdc7b48dac47e50aca1909ab9ff345234460f1bf534706d505496dd2254
-
SSDEEP
24576:XFWKcW3OuZZL3c7j2u5nWvgAB9zmAk+2+Y8PMLq/5vzsSH0F1nq00wrRz9eLtUko:E7WVZZLs7j2hvgWt1JHPsc0L86EU3P
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
vidar
11.8
fc02efe1cfb2a62f36f33fff0274fb41
https://t.me/fu4chmo
https://steamcommunity.com/profiles/76561199802540894
-
user_agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/17.6 Safari/605.1.15 Ddg/17.6
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Vidar Stealer 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1008998001\FFfl07u.exe family_vidar_v7 behavioral2/memory/3884-63-0x0000000000F10000-0x0000000001169000-memory.dmp family_vidar_v7 behavioral2/memory/3884-128-0x0000000000F10000-0x0000000001169000-memory.dmp family_vidar_v7 -
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/3984-82-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
630c068725.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 630c068725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 630c068725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 630c068725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 630c068725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 630c068725.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 630c068725.exe -
Stealc family
-
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
Processes:
skotes.exeskotes.exe737e5479e2.exe435722fa1d.exe630c068725.exeskotes.exe631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe5f39916bc2.exeskotes.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 737e5479e2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 435722fa1d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 630c068725.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5f39916bc2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid process 2428 chrome.exe 4892 chrome.exe 4088 chrome.exe 2120 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
737e5479e2.exe5f39916bc2.exe435722fa1d.exe630c068725.exe631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exeskotes.exeskotes.exeskotes.exeskotes.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 737e5479e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5f39916bc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 435722fa1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 630c068725.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 737e5479e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 630c068725.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 435722fa1d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5f39916bc2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exeskotes.exeFFfl07u.exe737e5479e2.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation FFfl07u.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 737e5479e2.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exeskotes.exe737e5479e2.exeFFfl07u.exe5f39916bc2.exe435722fa1d.exed071a3da76.exe630c068725.exeskotes.exeservice123.exeskotes.exeservice123.exepid process 3756 skotes.exe 2828 skotes.exe 3984 737e5479e2.exe 3884 FFfl07u.exe 3704 5f39916bc2.exe 1348 435722fa1d.exe 3868 d071a3da76.exe 3492 630c068725.exe 4908 skotes.exe 2680 service123.exe 4000 skotes.exe 5940 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
737e5479e2.exe435722fa1d.exeskotes.exe631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exeskotes.exe630c068725.exeskotes.exeskotes.exe5f39916bc2.exedescription ioc process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 737e5479e2.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 435722fa1d.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 630c068725.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 5f39916bc2.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid process 2680 service123.exe 5940 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
630c068725.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 630c068725.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 630c068725.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d071a3da76.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009002001\\d071a3da76.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\630c068725.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009003001\\630c068725.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5f39916bc2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009000001\\5f39916bc2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\435722fa1d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009001001\\435722fa1d.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\1009002001\d071a3da76.exe autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exeskotes.exeskotes.exe737e5479e2.exe5f39916bc2.exe435722fa1d.exe630c068725.exeskotes.exeskotes.exepid process 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe 3756 skotes.exe 2828 skotes.exe 3984 737e5479e2.exe 3704 5f39916bc2.exe 1348 435722fa1d.exe 3492 630c068725.exe 4908 skotes.exe 4000 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exedescription ioc process File created C:\Windows\Tasks\skotes.job 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5612 3984 WerFault.exe 737e5479e2.exe -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
timeout.exetaskkill.exeskotes.exe737e5479e2.exeFFfl07u.execmd.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exe631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe5f39916bc2.exe435722fa1d.exed071a3da76.exe630c068725.exeservice123.exeschtasks.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 737e5479e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFfl07u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f39916bc2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 435722fa1d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d071a3da76.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 630c068725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
FFfl07u.exe737e5479e2.exefirefox.exefirefox.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString FFfl07u.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 737e5479e2.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 FFfl07u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 737e5479e2.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 5076 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4016 taskkill.exe 4560 taskkill.exe 1348 taskkill.exe 4556 taskkill.exe 2556 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exeskotes.exeskotes.exe737e5479e2.exeFFfl07u.exe5f39916bc2.exe435722fa1d.exechrome.exed071a3da76.exe630c068725.exeskotes.exeskotes.exepid process 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe 3756 skotes.exe 3756 skotes.exe 2828 skotes.exe 2828 skotes.exe 3984 737e5479e2.exe 3984 737e5479e2.exe 3884 FFfl07u.exe 3884 FFfl07u.exe 3704 5f39916bc2.exe 3704 5f39916bc2.exe 3884 FFfl07u.exe 3884 FFfl07u.exe 1348 435722fa1d.exe 1348 435722fa1d.exe 2428 chrome.exe 2428 chrome.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3492 630c068725.exe 3492 630c068725.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3492 630c068725.exe 3492 630c068725.exe 3492 630c068725.exe 4908 skotes.exe 4908 skotes.exe 4000 skotes.exe 4000 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid process 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe630c068725.exedescription pid process Token: SeDebugPrivilege 2556 taskkill.exe Token: SeDebugPrivilege 4016 taskkill.exe Token: SeDebugPrivilege 4560 taskkill.exe Token: SeDebugPrivilege 1348 taskkill.exe Token: SeDebugPrivilege 4556 taskkill.exe Token: SeDebugPrivilege 4516 firefox.exe Token: SeDebugPrivilege 4516 firefox.exe Token: SeDebugPrivilege 3492 630c068725.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exed071a3da76.exechrome.exefirefox.exepid process 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 2428 chrome.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
d071a3da76.exefirefox.exepid process 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 4516 firefox.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe 3868 d071a3da76.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid process 4516 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exeskotes.exeFFfl07u.execmd.exed071a3da76.exe737e5479e2.exechrome.exedescription pid process target process PID 4376 wrote to memory of 3756 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe skotes.exe PID 4376 wrote to memory of 3756 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe skotes.exe PID 4376 wrote to memory of 3756 4376 631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe skotes.exe PID 3756 wrote to memory of 3984 3756 skotes.exe 737e5479e2.exe PID 3756 wrote to memory of 3984 3756 skotes.exe 737e5479e2.exe PID 3756 wrote to memory of 3984 3756 skotes.exe 737e5479e2.exe PID 3756 wrote to memory of 3884 3756 skotes.exe FFfl07u.exe PID 3756 wrote to memory of 3884 3756 skotes.exe FFfl07u.exe PID 3756 wrote to memory of 3884 3756 skotes.exe FFfl07u.exe PID 3756 wrote to memory of 3704 3756 skotes.exe 5f39916bc2.exe PID 3756 wrote to memory of 3704 3756 skotes.exe 5f39916bc2.exe PID 3756 wrote to memory of 3704 3756 skotes.exe 5f39916bc2.exe PID 3756 wrote to memory of 1348 3756 skotes.exe 435722fa1d.exe PID 3756 wrote to memory of 1348 3756 skotes.exe 435722fa1d.exe PID 3756 wrote to memory of 1348 3756 skotes.exe 435722fa1d.exe PID 3884 wrote to memory of 1964 3884 FFfl07u.exe cmd.exe PID 3884 wrote to memory of 1964 3884 FFfl07u.exe cmd.exe PID 3884 wrote to memory of 1964 3884 FFfl07u.exe cmd.exe PID 1964 wrote to memory of 5076 1964 cmd.exe timeout.exe PID 1964 wrote to memory of 5076 1964 cmd.exe timeout.exe PID 1964 wrote to memory of 5076 1964 cmd.exe timeout.exe PID 3756 wrote to memory of 3868 3756 skotes.exe d071a3da76.exe PID 3756 wrote to memory of 3868 3756 skotes.exe d071a3da76.exe PID 3756 wrote to memory of 3868 3756 skotes.exe d071a3da76.exe PID 3868 wrote to memory of 2556 3868 d071a3da76.exe taskkill.exe PID 3868 wrote to memory of 2556 3868 d071a3da76.exe taskkill.exe PID 3868 wrote to memory of 2556 3868 d071a3da76.exe taskkill.exe PID 3984 wrote to memory of 2428 3984 737e5479e2.exe chrome.exe PID 3984 wrote to memory of 2428 3984 737e5479e2.exe chrome.exe PID 2428 wrote to memory of 3340 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 3340 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 4748 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2148 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 2148 2428 chrome.exe chrome.exe PID 2428 wrote to memory of 3048 2428 chrome.exe chrome.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe"C:\Users\Admin\AppData\Local\Temp\631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\1008992001\737e5479e2.exe"C:\Users\Admin\AppData\Local\Temp\1008992001\737e5479e2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb9a01cc40,0x7ffb9a01cc4c,0x7ffb9a01cc585⤵PID:3340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2004,i,17665868594211408344,1326787691109311547,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2000 /prefetch:25⤵PID:4748
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2180,i,17665868594211408344,1326787691109311547,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2192 /prefetch:35⤵PID:2148
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2268,i,17665868594211408344,1326787691109311547,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2488 /prefetch:85⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3196,i,17665868594211408344,1326787691109311547,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3216 /prefetch:15⤵
- Uses browser remote debugging
PID:4892
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3220,i,17665868594211408344,1326787691109311547,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3300 /prefetch:15⤵
- Uses browser remote debugging
PID:4088
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4272,i,17665868594211408344,1326787691109311547,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4548 /prefetch:15⤵
- Uses browser remote debugging
PID:2120
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2844
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3984 -s 12604⤵
- Program crash
PID:5612
-
-
-
C:\Users\Admin\AppData\Local\Temp\1008998001\FFfl07u.exe"C:\Users\Admin\AppData\Local\Temp\1008998001\FFfl07u.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\EGCFIDAFBFBA" & exit4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:5076
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009000001\5f39916bc2.exe"C:\Users\Admin\AppData\Local\Temp\1009000001\5f39916bc2.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3704
-
-
C:\Users\Admin\AppData\Local\Temp\1009001001\435722fa1d.exe"C:\Users\Admin\AppData\Local\Temp\1009001001\435722fa1d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348
-
-
C:\Users\Admin\AppData\Local\Temp\1009002001\d071a3da76.exe"C:\Users\Admin\AppData\Local\Temp\1009002001\d071a3da76.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:2580
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4516 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2016 -parentBuildID 20240401114208 -prefsHandle 1944 -prefMapHandle 1936 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b9d2857-e8c7-418b-b82f-ecd3768bf3cb} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" gpu6⤵PID:4340
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {72f293e6-6d5e-45a8-93c8-2a2f2461ea8e} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" socket6⤵PID:3936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2788 -childID 1 -isForBrowser -prefsHandle 3148 -prefMapHandle 3144 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a925122b-2f85-4d47-a82d-0c0ef2f356e9} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" tab6⤵PID:464
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3600 -childID 2 -isForBrowser -prefsHandle 3880 -prefMapHandle 3764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {794dc078-510e-48b7-938d-fe20c6c94dbb} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" tab6⤵PID:1112
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4852 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4848 -prefMapHandle 4844 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63ac8067-65eb-48bb-b479-f75b1cc8af0b} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" utility6⤵
- Checks processor information in registry
PID:5468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4284 -childID 3 -isForBrowser -prefsHandle 5220 -prefMapHandle 5232 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {82d2bc67-2aab-407d-b2d9-00de35564fc7} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" tab6⤵PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5428 -childID 4 -isForBrowser -prefsHandle 5436 -prefMapHandle 4020 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9b7ba6e-8bcf-4c27-a2fd-1459c8e83d2d} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" tab6⤵PID:6008
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5604 -childID 5 -isForBrowser -prefsHandle 5612 -prefMapHandle 5616 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1216 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {04635931-37f6-4ea8-990b-ef55dbc258da} 4516 "\\.\pipe\gecko-crash-server-pipe.4516" tab6⤵PID:6052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009003001\630c068725.exe"C:\Users\Admin\AppData\Local\Temp\1009003001\630c068725.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3492
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3984 -ip 39841⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4000
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5940
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5bc9bec770bd8d2d933cba2942a2997fa
SHA1c0849c0047f6a6d31c0c3e6e9faa9b0a3c66e070
SHA256fe56b36d4466a23f44f7cd276abd708ee4a921b216a3b61a2d42741de220e4bd
SHA51210d72df4c6c4e34b96101b47dfd6dad28d92e794848437fab8f209bc20fe932a54e2b3e6664132f73a0fd5fe5ebd241aebe266701eb068fea12ea457ce1e20ab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD509d176e923182302dd55554ff6976402
SHA11c989bd99da38adac407cf43fbb75330d2b77a44
SHA25663b43f497396375e23369a54ff86cddd65701a45c038620199cdfd54b9c76b7a
SHA5120a325b7b7b8853a61382d15685af7be4be2cc368881addaf4054d999c9881f5a58af7147ab11d29dcce172e1687f10e8c19ba6a0bb5c239ac082a5bcda4c5828
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\F8CBD54DDA10F4286A41EC6A537240712D6C2308
Filesize9KB
MD5a611e50e520d39f98b0f23562fc0e4a0
SHA12bb3e8c129653e90f78acc93222cd7dd99682bd7
SHA2568321469657d31903518d4c7e52f378284d5fe54a9d3db91b5538c3ebb43b5391
SHA512e97b0e2416d00d19c5938fc0441a20d427aca2a08ce9cd19291f48e587df3ae4540456ccb6c7f0e6102b0a437343473dbce803508216f2e9af0f0923e7abbb06
-
Filesize
4.2MB
MD52b0c7447e2568d3a7de91ecd14787204
SHA1658b8b86bd1f906cf2e30675f8fe7de8b350fb79
SHA25615132d20fdd894d09f23b8e7bdaf49736a0191a230a24141c63000d4b43ca72a
SHA512b24c2337c69573c9d772b75512f40fa7baece45ad3de2cbdb9bcf2649056de583bc4245f1b06baf6e8ae7be1cc024a9578fe11874b52f352b9db5ad7803cb73d
-
Filesize
275KB
MD50abcf5f274cf19c6f9c75954e9b6a182
SHA1e39e1cecaffce08ffd9388ded9e13132e1eb6d51
SHA25654267849112931dc771eac100a8e3302f224f5071cc6211723e5acf89bf69156
SHA512c61dc07371b03d9a959ff7caac8265eea345fa78e4939d0a4d9491ef879287046ec6e0847b4067c3043fb97f4c1f94c2ac0f5bbc9ba18716ef6e02a4268f02fd
-
Filesize
1.8MB
MD59ffd11dacd9e499a8a7b86e408997489
SHA12f19287e2a190db2e604f790f9388b7216ae27b0
SHA25687c3e97ca98903b7569d1ed39239c06f73ed311bdd13ceb3768acadbccb7616d
SHA512bfa425ac138466140934c46b46af04746ee959c48a95e2b87cc8c6c2a492edeee4d2829797514e335865e9ee532c04c83df02aa7b5ca1386f9671c1e31692da7
-
Filesize
1.7MB
MD5dbcb2bb33cc623898e5f5e93af43366f
SHA1cf579373ffcec785e9fe2070c9a1fea1fe2cf62f
SHA2564e9e5f4322649ec1edbf95ced7863a6df6413c933a780c6bee147c11eee28a56
SHA512cebe946cdc4cd62fccd0e39a0a0bc64ac34da1de7515743c1db3ca7b3af2dab5ab914141794b43b8a42a2dccf1cde2d41434372faecad19de3fdd9b972e4c5aa
-
Filesize
902KB
MD588623678d6dd9e5df17d5f8707e23b7f
SHA1440c24094221e0e835b61df02df09a0b8e872ac2
SHA25641b6779a36914ae217956d5762e8c102d1222358d5894a4792684170cc63539b
SHA512c1a31472328a5d342290f2623a667693e32d218c8936970472c4eabfe661753e8d9139ae0a9a191255443aa8c14c3deab6985dca51b8420baaba677bec30d73c
-
Filesize
2.6MB
MD513bcf53f60197abc7a0f147b7ed2567a
SHA18686ab285507d1f1efd50dc159f0e78de2f55f88
SHA25662642a0982651ce48cbfecd78b1ce42361605ab391b21a09ad53c1b273e51321
SHA512ec3555a12bae3f6a0774b53df0e7d06efdf04f3e5181fcd7297b7c1dc4ef0089ac3d9951e892b3133b104142893b16df12291f901f1627ba57c7d2b76156d7ea
-
Filesize
1.8MB
MD56c647887fa50b1e2b11f313871f854f9
SHA1d267af26188dc62cbe2759f851c9abff765e130d
SHA256631461baff2c972a573b06942ac6587b3b0e47d8692cb7b5847fec32b35c4e91
SHA51278e82405f4249c39b8051faefe58eb77142a70815e1ece8b7a7a76f44362408aa3aa4fdc7b48dac47e50aca1909ab9ff345234460f1bf534706d505496dd2254
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD53488ac7e32ff2b2c58f1e863cff4d537
SHA19b1a89c872b1aa2cd775282341ab9bcaaeefe10b
SHA2568cd564239e75a8bc51422fc66676ef0d0e3b85610c185f337d643bfb6d1b58e6
SHA5129dd50b3c1bfda8d62a267a287e443032d65ea66a3a372cab82303f8f6adf750ab6e987f862042a5bffcdc2d341147cee9e8abbc44ac0a7496f41b68fc666c865
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD57369fd824e8af18c9cda826556b000e5
SHA11b5a7e0fdbae3088a130196e8c6d4ac32ac49d3c
SHA25693f43f53ad018b5597eab8385d2aeaeb06754578a7b6811c6789b3956d3dc742
SHA51231bbdbf9f22882dc44e9620fc4f7ef0b2d2ad8094d9a9ca7b43731a8d1edceea4fb77107111eed20fe36919299e6ada71ff2acc6da757f1807c04ca257950aea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD584342d564a4ddaa72c47905cb4707bfe
SHA15762ee2f005283a93b0e609fbd3a2227bf87f435
SHA256a78dc2e2bf7703f0aa77cc84383605fd27c1b5e9f3e034ca5e23540267e8eca2
SHA51299e3c0fd71e952adc72bff8b2b9253568fce01be955370c7c3e6a44357acd5679df0d73bd820bae44ef3ed3a5628437f9e2fe74e344a579f816c38fef8b8a187
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD574bbd8276a44813066dbf70cf8ea6d6c
SHA1a10f549522f4c2361962b5663a5490baeaad1895
SHA25663372d28c7ab19d488bf092be546c670c881ece788b2bc1899e3c0067d40835b
SHA5127499f32d007de036150de6d2609f046c3cde8d9bd1ec9d2d110b4e85424c644ff2529950fc40dac7248d24f1dadba0105bde3284e7ee35e99d719d170559ff8b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5ce49343be2348505e99ae126a616f9fc
SHA151408f5f6c9e39d8da418119938ccd39b1e6656c
SHA2561b731bc2c4eb7910e07810e9534c9734f6175a367cdd399cd0633baf5b21c677
SHA51232af9ccaaa8846e60773b9bb978c7246a97fcff7f3da0d4b18ce45e0c2bbaf8741f284f74278a43393ac8d38529a741761e1be35e77346ec98a430c7b962a6f3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD58a582e426c55e0fc92d14910a374e298
SHA15fe27e9e8ee4245fd7a9daf7d94cb6da5de23522
SHA2565ca5d4452912646381f9f08fa63b055df45b65efe1832a22bab2da4924108879
SHA512e393c06026a7d7e5a58fdfb9ee67b2658d209c967f417cbfd6f9ab7788ca92163c4acf386389ac15f9a3d99d7cb9688fb4bea63144372aa311f5191d09c1f3a5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\61d0e209-027f-43a3-b07b-16bb7dccd74c
Filesize27KB
MD54dc4b399678856c39fb9a8cb7085b1ff
SHA10cf594ecaa226d73cebd4e9b1a693d6f09bb671a
SHA256e06dd7ea8ea062c5d791a1567e380fcef09fd78d9f0aee46bba47f620d5d8b94
SHA51253c992e1ddffa5a8d6313f76e798b013ce752b01a2d17b51d8777eea7381b02f59f0ee1905baefa2fef8a645052866066dbf691e64b6aa4b115415aa0c69770e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\84df7830-100b-4619-a457-44515a7b42d9
Filesize982B
MD5c56f3e75016c1b3fd647cfa1e816bc78
SHA103553f0c9f58893cbf2e5a5ecf3ac64db466eb99
SHA2566210bbc841732db88bdc0a145868f3e62e0ffa950b39c5a9becd8fcc7e345668
SHA512c2084fe8bf53e0b93bccc86c50f2a2a28625537965275678bea92fdeef3aaf3ee038b40f9ecfa1bacfcb31d65488d389502cdbcbddbdd78a85f9477937b3de81
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\df611ca3-5a9b-440c-8a28-bfb43790cab8
Filesize671B
MD598fa62b9c4416c0e4d8c16ecc0ec20db
SHA161f6e363ab0b3987ddd8d20500693fa6aef35b4e
SHA256aa925628b9aceb1925606c58d81518fd9278c360b10836a3824b71f302df1606
SHA5128f494f95faaa5fc5ee5cebd6de310f4454c4233f3e351b96fa30744f4a3fcf28d388185eaa97d740d1f903355c77121e8f864b0dc65e0f1e39f8c566cba73625
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5660d0a65461a4467aa11d4e0924dcc2e
SHA1fdc80bbe8fb75d3903c43fd61717475e23cda8f8
SHA25633c077b2c56149be386642af78255632f793d0a30c39136fa66cbd9d76732a4a
SHA5126c7e3e42f8fc6000cb962d2613cf65c1b36110a39ffc78192644382439571b7818a01245a8f951a732f280a6569b7b9796d74c43e5f81dcd71a21ffedcdbf3d0
-
Filesize
15KB
MD5202122e7993dd6087c21716be59ec9cc
SHA14f687458b5d842232d05c95eea2e1b4d778488e6
SHA256a35592488d54e4e49d05bdc3ba7bd3ec6bb1a50353f1d0d94fed3f15724d278e
SHA512d42cdbc27f511e59d363ced5ab0133b936d5aefb1296183cc928bd94feb3bf59457fb078345ddcb9d18aaee48c31a6c6d108d7f9f1c301fe6e99de091fcf5c97
-
Filesize
10KB
MD506259941118be07bdedce19f46f88a46
SHA174af579c844bcf740e06eda2c237c1739205a77d
SHA25659a60f6b40f8f530aa8e95192862147b4e1e041e4c20ccb6df2fce879950bfeb
SHA5123c2eedc38f222d268e4da07cf359ef1215a7ec7fafaffd00141a0eaa5412e56260c47b8b38af486957ee32d6b5937e6e148187f6f7144bc3e70eb757b166d941
-
Filesize
10KB
MD520b965f7c9552498cba68a5d2a3b2012
SHA19d610fa2ce5a37d877110fa44a3a99fb71b27392
SHA256557ad72052bdda230720862b9bf8a7fb76c58f71def6114db2773af2ed7600d0
SHA512f342677e8a474cc66d15ff4fa1919345c59e944dccf709d445ffdd94afd733c50bb31cd8fabdb74d0f8f76757c71ff11b62656ad2b881edf0aae4d7c052bfbad
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e