Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe
Resource
win7-20241023-en
General
-
Target
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe
-
Size
1.8MB
-
MD5
b952019692d113e3bd64693e3ad04368
-
SHA1
27cfaea2e08efd58369c8a2179d2a3fdd7a84193
-
SHA256
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30
-
SHA512
327f3a16ecc9623a301d22c99bc06fcd4ad3f75e8688aba028b01a6439f0582cd2465627764341bcb0ee4fcff837a23eaf700cecbee1ebc5693a7b79528703cd
-
SSDEEP
49152:l/5etYMV9zn7MMlS3Sf92c7+Nn0zBtCyo:l/EOwJnw6SilOt0zPo
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral2/memory/1968-422-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
ca4c2c2bbf.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ca4c2c2bbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ca4c2c2bbf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ca4c2c2bbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ca4c2c2bbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ca4c2c2bbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ca4c2c2bbf.exe -
Stealc family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
Processes:
AddInProcess32.exedescription pid Process procid_target PID 6140 created 2488 6140 AddInProcess32.exe 42 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
3cd2ae5c36.execa4c2c2bbf.exeskotes.exeskotes.exe0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exeskotes.exe95f9094641.exe908c6873fd.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3cd2ae5c36.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ca4c2c2bbf.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 95f9094641.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 908c6873fd.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 5612 chrome.exe 1416 chrome.exe 4828 chrome.exe 5016 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe908c6873fd.exeskotes.exe3cd2ae5c36.execa4c2c2bbf.exeskotes.exe95f9094641.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 908c6873fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3cd2ae5c36.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ca4c2c2bbf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 95f9094641.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 908c6873fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ca4c2c2bbf.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 95f9094641.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3cd2ae5c36.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exeskotes.exe95f9094641.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 95f9094641.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exe95f9094641.exe908c6873fd.exe3cd2ae5c36.exe18346901b3.execa4c2c2bbf.exex4lburt.execomputerlead.exeskotes.exeservice123.exeskotes.exeservice123.exepid Process 3140 skotes.exe 1968 95f9094641.exe 2300 908c6873fd.exe 1708 3cd2ae5c36.exe 3348 18346901b3.exe 3720 ca4c2c2bbf.exe 5180 x4lburt.exe 5260 computerlead.exe 5196 skotes.exe 6024 service123.exe 5836 skotes.exe 5764 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
908c6873fd.exe3cd2ae5c36.execa4c2c2bbf.exeskotes.exeskotes.exe0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exeskotes.exe95f9094641.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 908c6873fd.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 3cd2ae5c36.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine ca4c2c2bbf.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 95f9094641.exe -
Loads dropped DLL 2 IoCs
Processes:
service123.exeservice123.exepid Process 6024 service123.exe 5764 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
ca4c2c2bbf.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ca4c2c2bbf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ca4c2c2bbf.exe -
Adds Run key to start application 2 TTPs 5 IoCs
Processes:
skotes.exex4lburt.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\908c6873fd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009114001\\908c6873fd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3cd2ae5c36.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009115001\\3cd2ae5c36.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\18346901b3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009116001\\18346901b3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ca4c2c2bbf.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009117001\\ca4c2c2bbf.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x4lburt.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/files/0x0007000000023cd5-87.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exeskotes.exe95f9094641.exe908c6873fd.exe3cd2ae5c36.execa4c2c2bbf.exeskotes.exeskotes.exepid Process 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 3140 skotes.exe 1968 95f9094641.exe 2300 908c6873fd.exe 1708 3cd2ae5c36.exe 3720 ca4c2c2bbf.exe 5196 skotes.exe 5836 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
computerlead.exedescription pid Process procid_target PID 5260 set thread context of 6140 5260 computerlead.exe 135 -
Drops file in Windows directory 1 IoCs
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target Process procid_target 5924 1968 WerFault.exe 90 5336 6140 WerFault.exe 135 -
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3cd2ae5c36.exetaskkill.exe908c6873fd.execomputerlead.exeservice123.exeschtasks.exefontdrvhost.exe0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe18346901b3.exetaskkill.execa4c2c2bbf.exeAddInProcess32.exeskotes.exe95f9094641.exetaskkill.exetaskkill.exetaskkill.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3cd2ae5c36.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 908c6873fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language computerlead.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fontdrvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18346901b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca4c2c2bbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95f9094641.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exefirefox.exe95f9094641.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 95f9094641.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 95f9094641.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3620 taskkill.exe 1864 taskkill.exe 4872 taskkill.exe 4368 taskkill.exe 2852 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 37 IoCs
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exeskotes.exe95f9094641.exe908c6873fd.exe3cd2ae5c36.exe18346901b3.execa4c2c2bbf.execomputerlead.exechrome.exeskotes.exeskotes.exeAddInProcess32.exefontdrvhost.exepid Process 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 3140 skotes.exe 3140 skotes.exe 1968 95f9094641.exe 1968 95f9094641.exe 2300 908c6873fd.exe 2300 908c6873fd.exe 1708 3cd2ae5c36.exe 1708 3cd2ae5c36.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3720 ca4c2c2bbf.exe 3720 ca4c2c2bbf.exe 3720 ca4c2c2bbf.exe 3720 ca4c2c2bbf.exe 3720 ca4c2c2bbf.exe 5260 computerlead.exe 5260 computerlead.exe 5260 computerlead.exe 5260 computerlead.exe 5612 chrome.exe 5612 chrome.exe 5196 skotes.exe 5196 skotes.exe 5836 skotes.exe 5836 skotes.exe 6140 AddInProcess32.exe 6140 AddInProcess32.exe 6140 AddInProcess32.exe 6140 AddInProcess32.exe 4340 fontdrvhost.exe 4340 fontdrvhost.exe 4340 fontdrvhost.exe 4340 fontdrvhost.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe -
Suspicious use of AdjustPrivilegeToken 13 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.execa4c2c2bbf.execomputerlead.exechrome.exedescription pid Process Token: SeDebugPrivilege 4872 taskkill.exe Token: SeDebugPrivilege 4368 taskkill.exe Token: SeDebugPrivilege 2852 taskkill.exe Token: SeDebugPrivilege 3620 taskkill.exe Token: SeDebugPrivilege 1864 taskkill.exe Token: SeDebugPrivilege 652 firefox.exe Token: SeDebugPrivilege 652 firefox.exe Token: SeDebugPrivilege 3720 ca4c2c2bbf.exe Token: SeDebugPrivilege 5260 computerlead.exe Token: SeShutdownPrivilege 5612 chrome.exe Token: SeCreatePagefilePrivilege 5612 chrome.exe Token: SeShutdownPrivilege 5612 chrome.exe Token: SeCreatePagefilePrivilege 5612 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe18346901b3.exefirefox.exechrome.exepid Process 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 3348 18346901b3.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe 5612 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
Processes:
18346901b3.exefirefox.exepid Process 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 3348 18346901b3.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 652 firefox.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe 3348 18346901b3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
firefox.exepid Process 652 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exeskotes.exe18346901b3.exefirefox.exefirefox.exedescription pid Process procid_target PID 3668 wrote to memory of 3140 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 82 PID 3668 wrote to memory of 3140 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 82 PID 3668 wrote to memory of 3140 3668 0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe 82 PID 3140 wrote to memory of 1968 3140 skotes.exe 90 PID 3140 wrote to memory of 1968 3140 skotes.exe 90 PID 3140 wrote to memory of 1968 3140 skotes.exe 90 PID 3140 wrote to memory of 2300 3140 skotes.exe 91 PID 3140 wrote to memory of 2300 3140 skotes.exe 91 PID 3140 wrote to memory of 2300 3140 skotes.exe 91 PID 3140 wrote to memory of 1708 3140 skotes.exe 92 PID 3140 wrote to memory of 1708 3140 skotes.exe 92 PID 3140 wrote to memory of 1708 3140 skotes.exe 92 PID 3140 wrote to memory of 3348 3140 skotes.exe 93 PID 3140 wrote to memory of 3348 3140 skotes.exe 93 PID 3140 wrote to memory of 3348 3140 skotes.exe 93 PID 3348 wrote to memory of 4872 3348 18346901b3.exe 94 PID 3348 wrote to memory of 4872 3348 18346901b3.exe 94 PID 3348 wrote to memory of 4872 3348 18346901b3.exe 94 PID 3348 wrote to memory of 4368 3348 18346901b3.exe 96 PID 3348 wrote to memory of 4368 3348 18346901b3.exe 96 PID 3348 wrote to memory of 4368 3348 18346901b3.exe 96 PID 3348 wrote to memory of 2852 3348 18346901b3.exe 98 PID 3348 wrote to memory of 2852 3348 18346901b3.exe 98 PID 3348 wrote to memory of 2852 3348 18346901b3.exe 98 PID 3348 wrote to memory of 3620 3348 18346901b3.exe 100 PID 3348 wrote to memory of 3620 3348 18346901b3.exe 100 PID 3348 wrote to memory of 3620 3348 18346901b3.exe 100 PID 3348 wrote to memory of 1864 3348 18346901b3.exe 102 PID 3348 wrote to memory of 1864 3348 18346901b3.exe 102 PID 3348 wrote to memory of 1864 3348 18346901b3.exe 102 PID 3348 wrote to memory of 3672 3348 18346901b3.exe 104 PID 3348 wrote to memory of 3672 3348 18346901b3.exe 104 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 3672 wrote to memory of 652 3672 firefox.exe 105 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 PID 652 wrote to memory of 4520 652 firefox.exe 106 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2488
-
C:\Windows\SysWOW64\fontdrvhost.exe"C:\Windows\System32\fontdrvhost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4340
-
-
C:\Users\Admin\AppData\Local\Temp\0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe"C:\Users\Admin\AppData\Local\Temp\0d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\1009109001\95f9094641.exe"C:\Users\Admin\AppData\Local\Temp\1009109001\95f9094641.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5612 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff866c5cc40,0x7ff866c5cc4c,0x7ff866c5cc585⤵PID:5628
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1928,i,11632576507866075068,5626134435684258101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1924 /prefetch:25⤵PID:5804
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2008,i,11632576507866075068,5626134435684258101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2148 /prefetch:35⤵PID:5848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1832,i,11632576507866075068,5626134435684258101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2476 /prefetch:85⤵PID:5904
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3172,i,11632576507866075068,5626134435684258101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3180 /prefetch:15⤵
- Uses browser remote debugging
PID:4828
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3188,i,11632576507866075068,5626134435684258101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3224 /prefetch:15⤵
- Uses browser remote debugging
PID:1416
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4452,i,11632576507866075068,5626134435684258101,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4488 /prefetch:15⤵
- Uses browser remote debugging
PID:5016
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6024
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5780
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 12684⤵
- Program crash
PID:5924
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009114001\908c6873fd.exe"C:\Users\Admin\AppData\Local\Temp\1009114001\908c6873fd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\1009115001\3cd2ae5c36.exe"C:\Users\Admin\AppData\Local\Temp\1009115001\3cd2ae5c36.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
C:\Users\Admin\AppData\Local\Temp\1009116001\18346901b3.exe"C:\Users\Admin\AppData\Local\Temp\1009116001\18346901b3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2012 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e59b7a78-902e-432f-85a7-dbcce901a398} 652 "\\.\pipe\gecko-crash-server-pipe.652" gpu6⤵PID:4520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2420 -prefMapHandle 2416 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {68f13ce4-580a-4c27-baa5-19f4d7f00f16} 652 "\\.\pipe\gecko-crash-server-pipe.652" socket6⤵PID:4532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2988 -childID 1 -isForBrowser -prefsHandle 2896 -prefMapHandle 3272 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {77f69794-8552-4181-bb2b-1d48480e83c7} 652 "\\.\pipe\gecko-crash-server-pipe.652" tab6⤵PID:2188
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3900 -childID 2 -isForBrowser -prefsHandle 3888 -prefMapHandle 3884 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9681a7e6-8a71-4bf5-96ac-e56e9b1848ae} 652 "\\.\pipe\gecko-crash-server-pipe.652" tab6⤵PID:2248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4272 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4540 -prefMapHandle 4532 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {63894e0c-a8fe-488f-b1ea-b9905e25f500} 652 "\\.\pipe\gecko-crash-server-pipe.652" utility6⤵
- Checks processor information in registry
PID:5136
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5160 -childID 3 -isForBrowser -prefsHandle 5436 -prefMapHandle 5168 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cab29f7a-e1a1-4760-b6c6-5c8420a9f849} 652 "\\.\pipe\gecko-crash-server-pipe.652" tab6⤵PID:5156
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 4 -isForBrowser -prefsHandle 5656 -prefMapHandle 5660 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bc262965-514d-48a4-91ec-7df6e8103482} 652 "\\.\pipe\gecko-crash-server-pipe.652" tab6⤵PID:3252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5852 -childID 5 -isForBrowser -prefsHandle 5932 -prefMapHandle 5928 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1256 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {68259828-00c7-42fa-9bc6-af1f2149b76d} 652 "\\.\pipe\gecko-crash-server-pipe.652" tab6⤵PID:1600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009117001\ca4c2c2bbf.exe"C:\Users\Admin\AppData\Local\Temp\1009117001\ca4c2c2bbf.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3720
-
-
C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"C:\Users\Admin\AppData\Local\Temp\1009118001\x4lburt.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\computerlead.exe4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5260 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6140 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6140 -s 3406⤵
- Program crash
PID:5336
-
-
-
-
-
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5160
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5196
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1968 -ip 19681⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5836
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5764
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 6140 -ip 61401⤵PID:5968
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5d7a048427141c14f80474541224dc3a4
SHA1a22302932dea33f24977f82f0cd5895a062d2521
SHA256c0ef210390299d1529d6d7bded137ec394ad1d21f34ba9832d256dcb002b6c69
SHA51259d0ef9de7e5858b2bb9ef86c7cca98a63a1309f9ab9128792f40a251967d63bc0fe8ec9353ea5e441c06372d5e61748e4d5ae1c452a234fb89ab02c8f4e90e2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5122d2d12738297b1838c3c99c8792503
SHA19c483fdd4a2f91cbb1354d989e0335093fe68ceb
SHA2566fa861e7c9bbf0868042d6242df2cd3edf1e94989d3b8569d4d826e43021ee96
SHA512f43dfbfd3b438f0691341c175f03ece9e7bf2b680466b1ae02b89c1cdefe2d603232e174501c592ad1de4b85c31648ed2aacd34f0df4b1d6fbe106ea5625d625
-
Filesize
4.2MB
MD50e6a28f3dee9cb4df195327184fc0227
SHA196ebb30be7ee04eb4491128fdc193000d6a05d74
SHA2560d1436daa022833897022dbf4486a009a6a1938a434b3ae00eb84a6a362a5170
SHA5121cb0163fe35751238a2cee3589ee7713b6f4b655803804f28162cf790dd65cfeaf357c457448b855f55aa32145c7708187343e7c11c14644046f24127bf405c6
-
Filesize
1.8MB
MD5339b28fd2dbb4a572a4fc6b7207448d7
SHA1d6ca6c0291a42d08bf0cdd9e8b528ee2ac90f0d8
SHA256dcfcbcb7ccf29f1ef5e01d31ed51789783c2e2a3ab2a77543cde49479556ae37
SHA51261527fb19bafcb69cd612f44f7a1fa0fc89e1ef68053cb81e78551a50e65477a2f9b8840b4a85c8896449dc1d0c84d123a798b00b0f0ed8f4141d444812e4796
-
Filesize
1.7MB
MD56487be67797f2ab4bcd902c3b34efe97
SHA16b4a7190c65c8c54c39e66fabab190afd36cb5fb
SHA256bab41e3e4289d1b7d5785304cc05ba4acbb42b51d5d18053305b6bd19a77474a
SHA512790db5f7a970c8528891b0524c30d6f85fea324cb7a87473bf309069daaa83bc0a6ad7aacf0e693890fbfc148649f7f06cb5062cac3f810f472fb4ca990e10ca
-
Filesize
900KB
MD555181cf50afa00196c7cbd00013e03a6
SHA1a5ac8deef254c7ff3580a6e8149638df870c192e
SHA256c29a9fb9427a83ccdbb4120d82f5808877fcc4fff3443779c334483d47a2d78a
SHA51220036cd1bce83e348943dc56e2ea66ba4f8d991b658d4cb2f3d321f48f0d57e129ada331e4db4d7b32051158292d0f4ce0b73b9611bea65d9abfe4b58f6f8d61
-
Filesize
2.6MB
MD5f87ac6c41d36f35ef2b8c6c959ccfe26
SHA11af22075b086492c4c254f04a7e06f9cac1f8aa0
SHA2560fcd2882d307444c83e0f7c26ce048780892df4184db29fd70713cff9a6bde70
SHA512cbfd14e1a7277cec2666273b4e43d79d483168ca1ba27c2ce9fb9bcf45e52dcce0545a2504f703d50ef5c5a21d7cff8e9666da9d342d0414701167a8dc4e5651
-
Filesize
932KB
MD596a7b754ca8e8f35ae9e2b88b9f25658
SHA1ed24a27a726b87c1d5bf1da60527e5801603bb8e
SHA25621d262741b3661b4bf1569f744dc5b5e6119cfa4f0748b9c0fa240f75442cc50
SHA512facb2e44f5a506349710e9b2d29f6664357d057444a6bd994cf3901dee7bea471247b47496cc4480f1ad2fac4b1867117072ea7a0bfa83d55ced4e00dda96745
-
Filesize
1.1MB
MD52354e800eefc681a7d60f3b6b28acfd9
SHA110b6a3d9d2283b5f98c9924fa1fca6da79edb720
SHA256d3c21f6c3892f0c444ffb4b06f962caddf68d2c3938bbd399a3056db255007e3
SHA5120395737b77891d8cf7761266c2b3d594deb8e742bd5f12f15f58b2c161c242356b953ebf8cd1f41924a917b2c1332bd2e05ef275efd2419a6134a60729195354
-
Filesize
1.8MB
MD5b952019692d113e3bd64693e3ad04368
SHA127cfaea2e08efd58369c8a2179d2a3fdd7a84193
SHA2560d4e184757275fc31e64693b91a0ff228cb88c80ed3d1498b3127aa715139b30
SHA512327f3a16ecc9623a301d22c99bc06fcd4ad3f75e8688aba028b01a6439f0582cd2465627764341bcb0ee4fcff837a23eaf700cecbee1ebc5693a7b79528703cd
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize6KB
MD57f7c557851ed1ff1294c733589bd863f
SHA1ec6cf95aad66247afb4550cdd8e8f105d816f321
SHA256a62f1be8f11b2b98f43a4c790d13ec59eb198c29fc9e5c47852431bc528aabd1
SHA512026586e1b17378f7a9c11fb62a04000240825f0d77f5ab35a221d3c1693c059b592c0e9950d8bea57097b3b3bcc6e618ac11474045044d5e7aa3690bc271283c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD55f1a66bf04e8b240d64562d1b1c02a1b
SHA19ab477e3083037a2e343cfe4275dffd818583ecd
SHA256cbb2f25c7ace14a5f806cf13712ed03967b4e0b7145b2f7e27c917510e16a11f
SHA512e29939f415c87ae116a2480cfbd634556025249b70a2ab110495b4bb9bc91a80946c045aff04c7b493122deed334c62f53384cab8176e93ac6959a1ad561ce7a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD50d1bd8ec006e3936406dcf14256f544a
SHA18e712649db66263c38141e9985a5f3142af462bf
SHA25659b4a35e60820e8fa639fe967b423b116e2d0f02eb2a3b027078027fc7aac446
SHA512452b5de70a357b9c7424be640fab2fd199711c42c7d55ac7cf6d1e4d664161a2fc3eb53c4b48b267e9e8ecde0cb09625af7325f9b3f8240169b36de1abef7f70
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5203e478de4c5fc7272dba7fd014beac9
SHA17b0ded55dae64d1134d0a330de0881683438b3e0
SHA2564a19790ea7254fac7e850dfe472424016e435703d598a868bfcaa1ea490ede6f
SHA512f89e21f7c45ca6df242c0bc066f81f06cfd87648a844431596119df641a90a649bf6a8419a3eb8383d66f79454b58b1057b81bb97feea3ac434af11db2ac8c49
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD52cd1d799393960477adae08d2b3f541a
SHA19dad60ab88254d45c9dbd2923e4618975c548991
SHA2565ae6a0fb35bcc445534649e62488100328756f5924af551f2c0ab9f6e6eefbbd
SHA5123ca79aa6a1d35657533ef9aaa90e9a3af112784f0e42a18a2c9347832c279994449b0c25cefa40b8bd5d1876a9133f294818634e71f923228595cacb7368663b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56eea1de559afcc2de7be5bd1f3c6fac7
SHA1ad5dd1a93e458379592b08d7d98ba0cc60e10ac3
SHA2562cd89ab37dc4778c3b17d8a1783256495894e977b43b245ca424e1339a813eec
SHA512754f172d79786824cbf24883d463cf38cb6e380bd1209edcd89b8c25b7a5d182c6bda8ab665ae7f9881e732473dd24b722b457d3277c8a2299c83fbe71ef2fea
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\4c241d3c-db4f-4541-893c-9f3d441f0eab
Filesize671B
MD502af9c608a2f8acd823dec0bafa0fd0b
SHA12957c09f4f18e6227f2366172ffe363f065f726a
SHA25680b9775bc1098aa0b74ec2ef9c588021f01f2af6359dbb5f04f7d22f2e6a4786
SHA512b4d647f8aa24376ee51942c16fe991f70a0d1c50cd76e297953cca6b845a3d17d470322b1d624e302f3603ea556e948996f29d7ef1be2da17d6acbc0cc4d4750
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\4e14d6e8-6123-49a8-a6c5-cc28fdd3500a
Filesize982B
MD55ca23075c5cf48ba2e7bd6999119bfda
SHA16d8b21fc2db7208c52f228def7704ab534944f51
SHA2562ab11fbea1da36f692464f7f1c5d79941d79cee56fcf4983701893aab50fb9c5
SHA512447a36a5d3f3b801eb80f1007a565e2ad4ed2cf7f2c2e4b44e0599877475806ce1e8a23db9ae07d9c237cb6dfab73c3f292188ac8b8ccd9bd9c78d2eba665d5b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\9d399fbf-ea2b-44f0-9d5e-bfa9b3e8512f
Filesize26KB
MD5b0e34e8f4ae5acef30112dcd809d0cf1
SHA125413c86f8ab55e2ab6a1274ccf3b305f8c421d5
SHA256969f3a9d42a272e0de0f22653e41b07395f3b77c93768537894ad09b747aee70
SHA5127925adeb83789c68fa265f3714234d38312986e1b622641812e7dc5f64ceaaea4824d1c0b132a8c74241234ec83a388fc7775026a91b14f5ce2bf52be719410c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD578ffe07663ff170f37a3e132c611c95d
SHA17a479a6246e95bfdb1265533ba77db240462c441
SHA2567aa8c8cb19bd139861182b0ed63f8fe4142e08b1e43c7c31c1ef3346d3c6e86d
SHA512146060315fc8bc42ce671df2672767ced38a03ad3d422342be1dcdea248466da059e87cb9c3c7c4ffcb3a0cba27d5e2efe2be226cc5140594feb2219c7fe1c7d
-
Filesize
15KB
MD5de2bee08842b09421587df066c1dde83
SHA19c9d4a778ef47a5403b8ab258567a134bad38d7b
SHA2569cccfb5b7aa6be0375b0540acaf5e4ab3fab5cece81376ebfa128a8d503bfcea
SHA51283dc1b2af9a503da6e03a1070093b1c7389443dbffbd384862589834a6b1ef1ad9b6e2b257974f61009fa62260621979f13ae237aff809a452596153a8003d18
-
Filesize
10KB
MD51d51deebf6935dd0127b8ed0a11bc1be
SHA159709b2367a93075e01fb709a3d9a23f6447c7d2
SHA2565a986e620bb60cf037f044e2a522ae9752333dff74fddfa825cfd7444f2515cb
SHA5127fe0e0da8ce0771f2c818dc145b49c89cbbc1ba985965e357c9c4e7c6b631b2cf84d622f38d5ae9f7226ba3fd6377cad0c91637528dcb2ac19a8feaadb27d80c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize960KB
MD5ec89babd27020a633eb7464355af0c10
SHA1aaf1611760e467688d88e040ad8273d5264bced6
SHA25608e8fecbcb3ef2c15de3a9e1f2f260de703473fa6116d28de3dd167ab4ddd497
SHA512f8124c76a91203062c6d43ea5718f4379adbf66020e665d4f95040c1f9c2f4b0dbbb4749acbcf816c6d51ed059dbc6acc0b526caa4badafb8900c6ede8a30be6
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e