Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 21:56
Static task
static1
Behavioral task
behavioral1
Sample
71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe
Resource
win10v2004-20241007-en
General
-
Target
71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe
-
Size
1.8MB
-
MD5
2063ad6746859ba2896e6d3bc7082fbc
-
SHA1
f29d5bca4a5c61ba291be6cff88a46d5ac3babd0
-
SHA256
71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5
-
SHA512
1f1cdaf3cacced639f8d5e60a11ed515b52d7687032dd27bd41e0e42c15f2a226dbe4f8735f689a13dbb1eba112dfebbb237601e21af65e7f1f4d08b21720ae0
-
SSDEEP
49152:7Vel+D6aTiNJ68++EcPsRq+jkFSXc1wEoIJuL:7Yq723pEcmq+jhcqRL
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detect Poverty Stealer Payload 5 IoCs
resource yara_rule behavioral2/memory/2428-58-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/2428-60-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/2428-61-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/2428-63-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer behavioral2/memory/2428-80-0x0000000000400000-0x000000000040A000-memory.dmp family_povertystealer -
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/2532-106-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ae9b0ece8f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ae9b0ece8f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ae9b0ece8f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ae9b0ece8f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ae9b0ece8f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ae9b0ece8f.exe -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF f976914175.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f976914175.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f3138b50b8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15ea5985f0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ae9b0ece8f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5792 chrome.exe 3296 chrome.exe 5360 chrome.exe 5268 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ae9b0ece8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ae9b0ece8f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f3138b50b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15ea5985f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15ea5985f0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f976914175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f3138b50b8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f976914175.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation f976914175.exe -
Executes dropped EXE 12 IoCs
pid Process 2844 skotes.exe 2532 f976914175.exe 876 Tq4a1Bz.exe 2428 Tq4a1Bz.exe 1148 f3138b50b8.exe 4848 15ea5985f0.exe 3780 73439b0c4f.exe 2652 skotes.exe 2012 ae9b0ece8f.exe 4584 service123.exe 5088 skotes.exe 3312 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine f976914175.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine f3138b50b8.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 15ea5985f0.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine ae9b0ece8f.exe -
Loads dropped DLL 2 IoCs
pid Process 4584 service123.exe 3312 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ae9b0ece8f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ae9b0ece8f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ae9b0ece8f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009403001\\ae9b0ece8f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f3138b50b8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009400001\\f3138b50b8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15ea5985f0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009401001\\15ea5985f0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\73439b0c4f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009402001\\73439b0c4f.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0009000000023c0b-118.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 2844 skotes.exe 2532 f976914175.exe 1148 f3138b50b8.exe 4848 15ea5985f0.exe 2652 skotes.exe 2012 ae9b0ece8f.exe 5088 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 876 set thread context of 2428 876 Tq4a1Bz.exe 93 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 3100 1148 WerFault.exe 94 4544 1148 WerFault.exe 94 3740 2532 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f976914175.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ae9b0ece8f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tq4a1Bz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15ea5985f0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73439b0c4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Tq4a1Bz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3138b50b8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f976914175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f976914175.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 672 taskkill.exe 768 taskkill.exe 4280 taskkill.exe 3672 taskkill.exe 4216 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 2844 skotes.exe 2844 skotes.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 2532 f976914175.exe 1148 f3138b50b8.exe 1148 f3138b50b8.exe 4848 15ea5985f0.exe 4848 15ea5985f0.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 2652 skotes.exe 2652 skotes.exe 2012 ae9b0ece8f.exe 2012 ae9b0ece8f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 2012 ae9b0ece8f.exe 2012 ae9b0ece8f.exe 2012 ae9b0ece8f.exe 3296 chrome.exe 3296 chrome.exe 5088 skotes.exe 5088 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 672 taskkill.exe Token: SeDebugPrivilege 768 taskkill.exe Token: SeDebugPrivilege 4280 taskkill.exe Token: SeDebugPrivilege 3672 taskkill.exe Token: SeDebugPrivilege 4216 taskkill.exe Token: SeDebugPrivilege 3868 firefox.exe Token: SeDebugPrivilege 3868 firefox.exe Token: SeDebugPrivilege 2012 ae9b0ece8f.exe Token: SeShutdownPrivilege 3296 chrome.exe Token: SeCreatePagefilePrivilege 3296 chrome.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3780 73439b0c4f.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3780 73439b0c4f.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe 3296 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3780 73439b0c4f.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3780 73439b0c4f.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3868 firefox.exe 3780 73439b0c4f.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3868 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3844 wrote to memory of 2844 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 86 PID 3844 wrote to memory of 2844 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 86 PID 3844 wrote to memory of 2844 3844 71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe 86 PID 2844 wrote to memory of 2532 2844 skotes.exe 90 PID 2844 wrote to memory of 2532 2844 skotes.exe 90 PID 2844 wrote to memory of 2532 2844 skotes.exe 90 PID 2844 wrote to memory of 876 2844 skotes.exe 91 PID 2844 wrote to memory of 876 2844 skotes.exe 91 PID 2844 wrote to memory of 876 2844 skotes.exe 91 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 876 wrote to memory of 2428 876 Tq4a1Bz.exe 93 PID 2844 wrote to memory of 1148 2844 skotes.exe 94 PID 2844 wrote to memory of 1148 2844 skotes.exe 94 PID 2844 wrote to memory of 1148 2844 skotes.exe 94 PID 2844 wrote to memory of 4848 2844 skotes.exe 100 PID 2844 wrote to memory of 4848 2844 skotes.exe 100 PID 2844 wrote to memory of 4848 2844 skotes.exe 100 PID 2844 wrote to memory of 3780 2844 skotes.exe 102 PID 2844 wrote to memory of 3780 2844 skotes.exe 102 PID 2844 wrote to memory of 3780 2844 skotes.exe 102 PID 3780 wrote to memory of 672 3780 73439b0c4f.exe 103 PID 3780 wrote to memory of 672 3780 73439b0c4f.exe 103 PID 3780 wrote to memory of 672 3780 73439b0c4f.exe 103 PID 3780 wrote to memory of 768 3780 73439b0c4f.exe 107 PID 3780 wrote to memory of 768 3780 73439b0c4f.exe 107 PID 3780 wrote to memory of 768 3780 73439b0c4f.exe 107 PID 3780 wrote to memory of 4280 3780 73439b0c4f.exe 109 PID 3780 wrote to memory of 4280 3780 73439b0c4f.exe 109 PID 3780 wrote to memory of 4280 3780 73439b0c4f.exe 109 PID 3780 wrote to memory of 3672 3780 73439b0c4f.exe 111 PID 3780 wrote to memory of 3672 3780 73439b0c4f.exe 111 PID 3780 wrote to memory of 3672 3780 73439b0c4f.exe 111 PID 3780 wrote to memory of 4216 3780 73439b0c4f.exe 113 PID 3780 wrote to memory of 4216 3780 73439b0c4f.exe 113 PID 3780 wrote to memory of 4216 3780 73439b0c4f.exe 113 PID 3780 wrote to memory of 2224 3780 73439b0c4f.exe 115 PID 3780 wrote to memory of 2224 3780 73439b0c4f.exe 115 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 2224 wrote to memory of 3868 2224 firefox.exe 116 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 PID 3868 wrote to memory of 3172 3868 firefox.exe 117 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe"C:\Users\Admin\AppData\Local\Temp\71d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\1009393001\f976914175.exe"C:\Users\Admin\AppData\Local\Temp\1009393001\f976914175.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:2532 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3296 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ff8bf24cc40,0x7ff8bf24cc4c,0x7ff8bf24cc585⤵PID:2344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2028,i,1600955344117847695,6187138988588474420,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2024 /prefetch:25⤵PID:5284
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1828,i,1600955344117847695,6187138988588474420,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2444 /prefetch:35⤵PID:4444
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=1740,i,1600955344117847695,6187138988588474420,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2460 /prefetch:85⤵PID:2592
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3156,i,1600955344117847695,6187138988588474420,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3200 /prefetch:15⤵
- Uses browser remote debugging
PID:5360
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3172,i,1600955344117847695,6187138988588474420,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:5268
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3728,i,1600955344117847695,6187138988588474420,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4628 /prefetch:15⤵
- Uses browser remote debugging
PID:5792
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4584
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1384
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 15204⤵
- Program crash
PID:3740
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009399001\Tq4a1Bz.exe"C:\Users\Admin\AppData\Local\Temp\1009399001\Tq4a1Bz.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\1009399001\Tq4a1Bz.exe"C:\Users\Admin\AppData\Local\Temp\1009399001\Tq4a1Bz.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2428
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009400001\f3138b50b8.exe"C:\Users\Admin\AppData\Local\Temp\1009400001\f3138b50b8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1148 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 16084⤵
- Program crash
PID:3100
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1148 -s 15564⤵
- Program crash
PID:4544
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009401001\15ea5985f0.exe"C:\Users\Admin\AppData\Local\Temp\1009401001\15ea5985f0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\1009402001\73439b0c4f.exe"C:\Users\Admin\AppData\Local\Temp\1009402001\73439b0c4f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4216
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1956 -parentBuildID 20240401114208 -prefsHandle 1896 -prefMapHandle 1884 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e7f7494f-281e-4975-b873-55d5aef5fdd8} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" gpu6⤵PID:3172
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2460 -parentBuildID 20240401114208 -prefsHandle 2436 -prefMapHandle 2432 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8f55e972-f5f9-4d51-ac38-524002f1778b} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" socket6⤵PID:1912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3472 -childID 1 -isForBrowser -prefsHandle 3344 -prefMapHandle 3340 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {383d1ae1-e4fe-48a4-a794-cdcd2c0c3235} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" tab6⤵PID:4676
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3912 -childID 2 -isForBrowser -prefsHandle 3868 -prefMapHandle 2592 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {002485fa-771d-4f45-a39c-237ad8b209e8} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" tab6⤵PID:1284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4820 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4800 -prefMapHandle 4804 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c7f5892-b404-422e-b225-f44d53072b7c} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" utility6⤵
- Checks processor information in registry
PID:5364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5516 -childID 3 -isForBrowser -prefsHandle 5504 -prefMapHandle 5380 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a54f74b1-4166-4c1c-ae4d-b39023cd11ac} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" tab6⤵PID:2244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5496 -childID 4 -isForBrowser -prefsHandle 5668 -prefMapHandle 5672 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5882a7d3-7895-42f7-8b76-f25d1796a53a} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" tab6⤵PID:2040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5436 -childID 5 -isForBrowser -prefsHandle 5852 -prefMapHandle 5856 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1252 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4eb2e532-cb7f-41d0-91de-0df3c86ed5c1} 3868 "\\.\pipe\gecko-crash-server-pipe.3868" tab6⤵PID:5352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009403001\ae9b0ece8f.exe"C:\Users\Admin\AppData\Local\Temp\1009403001\ae9b0ece8f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 1148 -ip 11481⤵PID:872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1148 -ip 11481⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2652
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 2532 -ip 25321⤵PID:5580
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3312
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD529bbcfc7c57c095d73168364f4ba7ca8
SHA16681432b5081bb314f5a06e49cd3225b4ca55115
SHA256faae64aae2af871cc2485fb2e31ef5d517fbab9b15ce2edaf9e42ee18098d743
SHA51271cc0cd4015e4580212947c558c779b696716aa134f1d615a450a531a5ffc88009537fca1227ae9199090625cdd7815e921cb138d3b816714813466c8e83d3e8
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
354B
MD5717e24385bc022929ecbe9944c12b45a
SHA17e7190dc2878fea641f21d341f605b5d87c73713
SHA2566ae994410f04039bf8b3c4445c6dc294f8029bc164f158eb4ceb4008ae927190
SHA512cdfd924fb117cebabcd6651ba25230cfd1b0d3138b28c9c8e642bf2f511b83349576366cefb093c0d7a41f94e531a0a735ab23791effdb805cadb91793160705
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\activity-stream.discovery_stream.json.tmp
Filesize22KB
MD5f98081d5a1401700604528600dc8b799
SHA10e3afa8ed77d2c864ae24638d2f1257a57245908
SHA256f0a4fc96240497cc20dd4db7fe512239e9e7ca603ed85a2b146e73adfad24b42
SHA51249b2d45aa04372701228a11d584ec51d8cddb7f748a252cdbd41cfd68bb293fb9855cccc6add2ba747fcde5ff6314b62addc4b510e403a983798d2782e30f318
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5d4ca572337573e33f96295cf94a511ba
SHA1aa02bb8f1dbcfc8835662b3895b45eadd8b6b472
SHA256f3b24ef161b4cfe67000ac4289fd188b35ac24a4b9d1f5412ed7c34ad040b2fa
SHA512b1fe5f8a211745216a4792d11abedff5527bc12c6a59e45444bfa645b2ef4aad1b12766970cd0c28c0a1e952e02aa4a115c9dcc2cbcc02c15d5502200df139d8
-
Filesize
4.3MB
MD5f5776b965778a92b20d7cdcc3ed87b8a
SHA11b5a38a9d6b40243306672d8beba4bd38081788e
SHA256ae296c763a4d1175347ff21ca6b2fe38bbd3f5680be48bd20a27461fcd1632e5
SHA512b3ee8f35314f237087c8b1d43b0771384e20f2f0a40c3c0d4d064f1b3e5a6fb7986c169a7d7c313f08e0600e03257516bf8ea9c47c5f16c671aeb266b365c911
-
Filesize
185KB
MD59c433a245d7737ca7fa17490e460f14e
SHA131e6388f4e45a97a97ac0f34c26a9858ef8dcdb9
SHA2560b6604d2e6086f7322c634ab925bdc381fe720a2a12f254e5b63b42f89b680f7
SHA512edaf8ff778db40dfcacd7c8cb5cef598dc7c13ebfb6b4f8e828c0697b24115f637ac510c945d31b1c4873d39fca7d8be7b03ba6dc64e665def6bf2d058a00c95
-
Filesize
1.8MB
MD5f33c80d517734dd30771a89966179c74
SHA1da1b46cda41ca6d75753e2efaedb300d0a0ec6e9
SHA2561dcc039596d3f58e24e1d12ee64d51eb569f157689c3cb6ada3c2e932d314719
SHA512beeb262db01c7754c88d78ab1ddb3e3d588efec05d5b253003645ae9060e3f728b08d6551db0092d1abe02cda429c0b2cf8aefc7a64c1e845685d61a6f7e3c77
-
Filesize
1.7MB
MD56b1c2cd2ec903e7deafeebde9bf8fa76
SHA186e42568bc553434de430649f85c804e820b244f
SHA2565f23080097579060ce2606e5980045eacc19bf835e94a0d3a4691b55160cc4a8
SHA5122bc748c350b61d27dbb31afe2a68e467e4839ef5216f2574106322f3350cd14baa9a84f669cc2c818dae3d43aec69c40dc3d836342aec5c39af0afff4b0cfaa1
-
Filesize
901KB
MD5b14552016d4a0e1ced552484abddd6ac
SHA1f1bc41839dfa15df8b5e03a4598d6e40751c352b
SHA256f16f08a83223ee763f2b77189009796bfed2ba29dafdadeb6e908759bee80ad1
SHA512d90d5537481bbb40fee4858f479f487d4d03fff891c20d38dc90edff5538e30185e67210d30f3e6d012f016c695259e9d876981cc760bf4c19f407e56286a1e1
-
Filesize
2.7MB
MD54136b00434fc0d432a02c695772d4a0d
SHA1ba1a5e923bff50ff8a5ca73c04974ff1cf5ede3e
SHA2564a52cfc3f9a089248ff9476810d130863f0913684a321a7338e985f0b84183ef
SHA512602ffbb8fe4eb23ec92bc6de447cfbf0acc8f57f0d6cde28136db19a930063a591ae7c2c07f7f3805f412edea2db4b45935d66ede764221170515ac256dec468
-
Filesize
1.8MB
MD52063ad6746859ba2896e6d3bc7082fbc
SHA1f29d5bca4a5c61ba291be6cff88a46d5ac3babd0
SHA25671d1727ceeca04f6de46c377c3d94fe31de439e31454e320a7823c9aca1d82d5
SHA5121f1cdaf3cacced639f8d5e60a11ed515b52d7687032dd27bd41e0e42c15f2a226dbe4f8735f689a13dbb1eba112dfebbb237601e21af65e7f1f4d08b21720ae0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize6KB
MD5cfe94d3505620f82d20f738cc08a718f
SHA1fa239713a869d047779595230fa88b6372e8418e
SHA25629fc0098d95d67a5117341b2891dba05af78dac427c2f0d7123816c8cd9eadbe
SHA512820ed6ef34fec6ae2665c83179a494caa87061c9a8086442ba7af2d456bed945f9d8d0dcc39fdb151896e01697b93af80e8e6955eba38d177dbdca05cb905d0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD5b6bcc3b3fcdf92bca29e72746baf2983
SHA1136f765e3a8b8bf77b197648fcd7f67b11ae0b72
SHA25672e52e590dede3831de3f2f4cbf062297c5df847b7ea20cd65496c431920d05a
SHA5127d63e172f234727f03b4573f02b20c7e02c6910f02c8450b0d75823733828f88d40d7a37ec55b90499bc364c46f0cc57d69c45b1ca87049b3c817d99a05f7a25
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize10KB
MD51e66df6cd28dcf13a05f16559d0e6d72
SHA14afab828a56c787dd4cd34d190549a027a5af584
SHA25691a37ea15bdfad62283b5ca9822226f1bbabca0fa8e44f6a38212f16d0104996
SHA5126ee33ed38ea1df964407a11c35f100e543dc965120bae79600063429714382a69be7df69c7f07b05ee2578cd91f6cf77717559ead88188b434183039205efafe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57f46368bb7584f83060927a15a6b94d5
SHA1c0b8daa7819265d151f62bd599394ebdb0e47b89
SHA256b53bb70d5569b7b159e739cf44aadd462ed9d97ba899e394e709ae5ad8fe3866
SHA512c0e09bf31f2e23338c3d4d6df1fa91314bb671ce70f6756c040ba906dc9e015ec8647452d7162ce7e03ebf05c0522a5b9bbc70656c2257434545a0e2bf4fcf09
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5b99294bfc769f5d4e3723b6cda465043
SHA149664b65481207c3a166f1846cd1c415c7626a62
SHA2564a5e4e49334c5dff0bf96d47c1a58d0dcb1223a846ef780d431d2c9c38d78cb0
SHA5125b42924387eded9b884da9ea6ae12cc09d347775da1caff08f1704a3ae53cd0bbea15eed4cba7d920aa329d282dd0a3f448f9a024bb3b99e29b52d4c5d6a9a6a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5c825a46000bc5d4298623a02154253b6
SHA1eb12be2d30b75f6bf7f2ec4c6c0f43a3c9fb0455
SHA256a23cc54cf2ab8527d202bf3a695585414e0f436916abe8ed382126d5191b953f
SHA512e7ec66bf550e6ae2655e773f988c7cbcc4fc9c3a1955a7aaf488abe95577cbee6e23cf890cdcf5ebd57b48a59a96f579a0d622e32f616b0d259a37e01ec6fadd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD56bbe11f77b89b250dfa70004d1debe36
SHA1478cf823ffa19fa2b187217ec6efce8e230de892
SHA256aa351a0006d4f69d79cf704f267430b29940cf6efe579a5200902d48da75a4b2
SHA512535ad8bed0bd235532ac97252486a458cea2e83fe292b120dc2e3e707e97430bbe9d6cb968f57d9fd695659e0a90008d9f94a35335a7f4c01ef959048e72af33
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5f124b2b6f4bb0d9f7aa7157fe78bbea4
SHA1065fe1004d75c56fd51351d9e8c9e17111b11bb7
SHA2568556ebbe7b18bcd9bfcd0d664bda2c10414b045ba133bcb62278bdbc75dcf757
SHA5123179094712c1944665a1fe9a50ddba5a8fb5dae992615a5fe6705c3269be674bb3df51fb6293f71cb1f46b37de2fa9b2b9f3df9af12e6ce251eeb95d812b9557
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\29bd0c1e-163c-413e-bb0f-cb0d4c819eae
Filesize982B
MD5eba2f8fba29934e0838385e18bd1a949
SHA105687835b12fedb4339671743a605c67a034ede4
SHA256a3ba90c22167e8ab7dc0d56a5534918634a1001909d2374a83594fc65507a71a
SHA5122b6c9d38a294c4c6fab6d51b902dbfdf3741c1524a14f82a8dd809bb9f9b19b2f6a5d3e7d3fdfe34af8dbb531b4214bf4f0addf32c089a5745c0fb0143051c6f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\5cf5549e-069a-4f35-a143-54bee37d8e1e
Filesize26KB
MD581367348742f89bdf43de059711ffdd6
SHA1bba973c0a15796e08a18d499cbe6cf59519ccf9d
SHA25665e592062a24e89a3df9be275259bffe4ae717a0552fa18e7d16c7f2f88279c5
SHA512f24ca4f3c38d46799a38d8abf969b6238d010ad0c1d640685d01b07075e2dff65cea7d005c1546defc0e8b1f11e53f3490c5cf80deccd097668054324ab625c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\7d252617-a457-4c77-9880-5ae1c7b3d040
Filesize671B
MD5be8a114267bb62c3a7c5eeea184ffc2f
SHA15992fd1e3286c6a98ec03d88380488a9aac6cdd6
SHA256050d4ef3a41b96f98ce674a6233b6ae73dd313c65484b2eae7bc0f4189f0b84e
SHA51242b889adac4c448ab3c484c0be73e0e23bce22eb99065544986ea9ef19ce6de9497b1f71e2e8e8b7be43540436b55aac19208f136078e25e478ac6f52db76c4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD597b61da016b999e5e09aa7a2295faa69
SHA1dca7bdc5854d6c16c9bb6f6c40bc65f68137d04e
SHA2565fc4512b277403add7549207e126136e9dfcd802f4a4f237a9155c5556e3a4f6
SHA5121a0d3238bd6bd9a955c46c84ff821d5bb4c043dec1050629ebfffbe4a898978fb98c5ee3114734d96f6385f531cbf436a637e2a6a0fe8f25ed879378b683686b
-
Filesize
14KB
MD586edb89be6d2105e86716504c660cbb6
SHA120326167143dfb9f97954687b10e5065f7a90aa4
SHA25641aa0800195cf387822f174c37202b843088e00791b3353698ced3200f772218
SHA512d869f2226e4490a2ead4ab69ba4fbb864466155d528af0c2e831f2c9d73a251e5fb1c315ec93f10fb4e6e054713f4fba84a20dfe847005a4658eb0dc61b2ec20
-
Filesize
11KB
MD5550990bca2b98398becd2a9b90c94561
SHA18b8d5e875e83776e058776d93934d4add9013eaa
SHA2566610daf69f2e0db8dce5224500329e13166b088d3dec7b079fed2ef12292113b
SHA5125044b814a541475f57f2d391bfa7ba377e4d84f4ad25a96d5ca217a8885b233d34ca438a3c85983738f7edb3191a532ee92d857eb94414072d1d94d9d7bcdfbb
-
Filesize
11KB
MD5fc572964eab56d94148b863660a7f2e9
SHA15548baa675e7e48b2d9684ab4b551ecf368bd4da
SHA256b09a97149ee47297d4b8f03d6d45edfb546cb5051ab3207783642630b8c73c3e
SHA51261099073067fb3fc9b3c72629b7e14edbb45e933fa9764747dd00f2d6bc7c462669a1572e64e1c2908c859110590d33fceac4e6664456133ae22179d52ce10ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize920KB
MD5ce68820ec56fdbd72348e6810ae8c0cc
SHA1f5b0c2c6ad79d28c97814d273ac1206cdb2b2d90
SHA256096c7eb89d2d84f9489fcebd5d1c45ee13811245af25eb469ac4da97ff06204a
SHA512835270710192415f504d52ac3630f1ee3bd0ab27fa313f21e4dcb6c46a017d1dc2f7071d4fac521ddefe0a51120aec402265d3e8816bc66f4c725324d963f674
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize1.5MB
MD56263820b8a4c8e857d2937640e275d7e
SHA1270a1cfdab972571b9b46b85147b55e247ebba12
SHA256bbc1eff1e1cd61d02a0874023df6e9d51c238f6e3ed14b2bad18bbb2e00b814b
SHA5129e82fd68d4ccd0b57da5ba9c2335a307c672fb4f99402eb1249107259bac884c446c6f71f7b88939c1bdd9b010804fde82b5adb62c9984d5a4a70126edc1b22d