Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 01:54
Static task
static1
General
-
Target
245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe
-
Size
7.0MB
-
MD5
2dc5ea672c93a695e4b922915f08387e
-
SHA1
eafdd243d1dce5d6d8a2255528553b451386dda9
-
SHA256
245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531
-
SHA512
f6e7b6b02e6ca92004817462cb5b0d8b306e8b26e241288b7906010e7265d3627fc573808333bab3431e3fdae2cd065878dc7775c734a287049a6894c20373a9
-
SSDEEP
196608:uVmkazolSXgzRg368csJTpQIw5hiZs3OrbCr8NILPQmxs:u8kSJyC36iTxTbCrzLPQmxs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
Processes:
resource yara_rule behavioral1/memory/4620-88-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Processes:
4A994q.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4A994q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4A994q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4A994q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4A994q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4A994q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4A994q.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
skotes.exeskotes.exe1p70B8.exeskotes.exe2t1308.exe3F05T.exe4A994q.exe912f395f0e.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1p70B8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2t1308.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3F05T.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4A994q.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 912f395f0e.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 464 chrome.exe 4996 chrome.exe 1540 chrome.exe 2628 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
3F05T.exe4A994q.exe912f395f0e.exeskotes.exe1p70B8.exe2t1308.exeskotes.exeskotes.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3F05T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4A994q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 912f395f0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 912f395f0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1p70B8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1p70B8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2t1308.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3F05T.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4A994q.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2t1308.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1p70B8.exeskotes.exe912f395f0e.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1p70B8.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 912f395f0e.exe -
Executes dropped EXE 11 IoCs
Processes:
w0x87.exeC7c88.exe1p70B8.exeskotes.exe2t1308.exe3F05T.exe4A994q.exe912f395f0e.exeskotes.exeskotes.exeservice123.exepid Process 2996 w0x87.exe 316 C7c88.exe 2352 1p70B8.exe 2180 skotes.exe 2632 2t1308.exe 980 3F05T.exe 2856 4A994q.exe 4620 912f395f0e.exe 1496 skotes.exe 2856 skotes.exe 1276 service123.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
skotes.exeskotes.exe1p70B8.exeskotes.exe2t1308.exe3F05T.exe4A994q.exe912f395f0e.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1p70B8.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2t1308.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3F05T.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 4A994q.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 912f395f0e.exe -
Loads dropped DLL 1 IoCs
Processes:
service123.exepid Process 1276 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
4A994q.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4A994q.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4A994q.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exew0x87.exeC7c88.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" w0x87.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" C7c88.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
1p70B8.exeskotes.exe2t1308.exe3F05T.exe4A994q.exe912f395f0e.exeskotes.exeskotes.exepid Process 2352 1p70B8.exe 2180 skotes.exe 2632 2t1308.exe 980 3F05T.exe 2856 4A994q.exe 4620 912f395f0e.exe 1496 skotes.exe 2856 skotes.exe -
Drops file in Windows directory 1 IoCs
Processes:
1p70B8.exedescription ioc Process File created C:\Windows\Tasks\skotes.job 1p70B8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 4572 4620 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe2t1308.exe4A994q.exe912f395f0e.exew0x87.exeC7c88.exe1p70B8.exeskotes.exe3F05T.exeservice123.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2t1308.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4A994q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 912f395f0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language w0x87.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C7c88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1p70B8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3F05T.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
912f395f0e.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 912f395f0e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 912f395f0e.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
1p70B8.exeskotes.exe2t1308.exe3F05T.exe4A994q.exe912f395f0e.exeskotes.exechrome.exeskotes.exepid Process 2352 1p70B8.exe 2352 1p70B8.exe 2180 skotes.exe 2180 skotes.exe 2632 2t1308.exe 2632 2t1308.exe 980 3F05T.exe 980 3F05T.exe 2856 4A994q.exe 2856 4A994q.exe 2856 4A994q.exe 2856 4A994q.exe 4620 912f395f0e.exe 4620 912f395f0e.exe 1496 skotes.exe 1496 skotes.exe 464 chrome.exe 464 chrome.exe 2856 skotes.exe 2856 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
Processes:
chrome.exepid Process 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
4A994q.exechrome.exedescription pid Process Token: SeDebugPrivilege 2856 4A994q.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe Token: SeShutdownPrivilege 464 chrome.exe Token: SeCreatePagefilePrivilege 464 chrome.exe -
Suspicious use of FindShellTrayWindow 27 IoCs
Processes:
1p70B8.exechrome.exepid Process 2352 1p70B8.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe 464 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exew0x87.exeC7c88.exe1p70B8.exeskotes.exe912f395f0e.exechrome.exedescription pid Process procid_target PID 2640 wrote to memory of 2996 2640 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe 82 PID 2640 wrote to memory of 2996 2640 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe 82 PID 2640 wrote to memory of 2996 2640 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe 82 PID 2996 wrote to memory of 316 2996 w0x87.exe 83 PID 2996 wrote to memory of 316 2996 w0x87.exe 83 PID 2996 wrote to memory of 316 2996 w0x87.exe 83 PID 316 wrote to memory of 2352 316 C7c88.exe 84 PID 316 wrote to memory of 2352 316 C7c88.exe 84 PID 316 wrote to memory of 2352 316 C7c88.exe 84 PID 2352 wrote to memory of 2180 2352 1p70B8.exe 85 PID 2352 wrote to memory of 2180 2352 1p70B8.exe 85 PID 2352 wrote to memory of 2180 2352 1p70B8.exe 85 PID 316 wrote to memory of 2632 316 C7c88.exe 86 PID 316 wrote to memory of 2632 316 C7c88.exe 86 PID 316 wrote to memory of 2632 316 C7c88.exe 86 PID 2996 wrote to memory of 980 2996 w0x87.exe 91 PID 2996 wrote to memory of 980 2996 w0x87.exe 91 PID 2996 wrote to memory of 980 2996 w0x87.exe 91 PID 2640 wrote to memory of 2856 2640 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe 92 PID 2640 wrote to memory of 2856 2640 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe 92 PID 2640 wrote to memory of 2856 2640 245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe 92 PID 2180 wrote to memory of 4620 2180 skotes.exe 95 PID 2180 wrote to memory of 4620 2180 skotes.exe 95 PID 2180 wrote to memory of 4620 2180 skotes.exe 95 PID 4620 wrote to memory of 464 4620 912f395f0e.exe 100 PID 4620 wrote to memory of 464 4620 912f395f0e.exe 100 PID 464 wrote to memory of 1556 464 chrome.exe 101 PID 464 wrote to memory of 1556 464 chrome.exe 101 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 2064 464 chrome.exe 102 PID 464 wrote to memory of 4752 464 chrome.exe 103 PID 464 wrote to memory of 4752 464 chrome.exe 103 PID 464 wrote to memory of 4992 464 chrome.exe 104 PID 464 wrote to memory of 4992 464 chrome.exe 104 PID 464 wrote to memory of 4992 464 chrome.exe 104 PID 464 wrote to memory of 4992 464 chrome.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe"C:\Users\Admin\AppData\Local\Temp\245d6445b34baf3dc1e8b020cedf8a1bb25baa4f59b6cb8fc7ff4c41a0087531.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0x87.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\w0x87.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C7c88.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\C7c88.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1p70B8.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1p70B8.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\1009175001\912f395f0e.exe"C:\Users\Admin\AppData\Local\Temp\1009175001\912f395f0e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffce861cc40,0x7ffce861cc4c,0x7ffce861cc588⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1916,i,1822528893355450553,5994238563262656837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1908 /prefetch:28⤵PID:2064
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2196,i,1822528893355450553,5994238563262656837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2420 /prefetch:38⤵PID:4752
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2208,i,1822528893355450553,5994238563262656837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2428 /prefetch:88⤵PID:4992
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3220,i,1822528893355450553,5994238563262656837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3232 /prefetch:18⤵
- Uses browser remote debugging
PID:4996
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3448,i,1822528893355450553,5994238563262656837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3460 /prefetch:18⤵
- Uses browser remote debugging
PID:1540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4600,i,1822528893355450553,5994238563262656837,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4472 /prefetch:18⤵
- Uses browser remote debugging
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 13887⤵
- Program crash
PID:4572
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2t1308.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2t1308.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F05T.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F05T.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4A994q.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4A994q.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4620 -ip 46201⤵PID:2344
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
4.2MB
MD5e3f5abc2332ea769c91f7c6f2a5a664a
SHA12969a201926786c2e4d03f215077d2abec517dec
SHA2566bf3521dbb4d8610035627fd1ffba23169aaba4c7ed723522a1a73386edf5b69
SHA5126a2f821451483ad5781b761bd9f462fcbf6239c1d6260d2af02f128680588c56fb4b03ad199a01334ce50d4a351393a2dd69abd345fe949434c5733078949f2a
-
Filesize
2.7MB
MD5832c9676a2a7c2ad3af65ca7c3cde743
SHA1b773918c7b1880094b9da6153d27c9d718032df7
SHA2560ba03d7bec04e966e7190bd15147ceda3c950a0fcd02d2c0cfe0afd51e5b5eac
SHA51239c64a295bba8e1aab00025bd1f44b6c67e770ed34285667b4243244c90641a71a894159f7c8d9f95d757370907cbfb8f5572350a37963129a06b9f7f436282d
-
Filesize
5.4MB
MD59d648a7f9766529565cea0b1bc7c01a3
SHA194dad7b010f350aa20ace761f2f9c8553ffddb06
SHA256f2149f806c715bc29a43ff66572693b183cf55597412b57903e8ea70d2785ff7
SHA512cdf3151f53a72286388554b40cfd88013a56ef133554b9bde7d3d1cb0740aef91ce0fbe305264fa9fd56743fcae91a897a8cd424bdef3a3575dbcac53c9e2715
-
Filesize
1.7MB
MD5215acb5ad199adeadc4c630b59f09d17
SHA176609d0d3867fa6d84da0958b5c1a954e8643f49
SHA2564596bafc0efc36a8f3ec2574dba1e8ae82e5b6051a2b5cce1605057a20855072
SHA512358b95a6dc92baed9822c95f23fb13196f712ab4c92587a0b13feb35649ee09ecf63b01218cdb436542e0893a824c2b09d61cd1670b879d23fd08c2ce247a850
-
Filesize
3.7MB
MD55c7cb87fb893617ef0402433ea83d332
SHA19344f5a1d834e09c9e0a1328e1f34d1c82fd1ef8
SHA256c67d1f6a2bcf5a796ce1fe231c6a471030c54f2fde86349b67cc26fb1a4aa540
SHA512ad984388806dc285168d41a0a0ba060e328c71574e9cade37f361218846703039ecedc7ed85a91cc0250488127e0369e5b56b2277a652ade7c992b7796009bcc
-
Filesize
1.8MB
MD5ea7705c2143e7c21967211c16fceb549
SHA15ed0a996617121fe8c267bcb2b7e7adcbf8cf1be
SHA256f177f34b07fa2237adfda7ce8aa42889e1529bf25abe1f7df58613c8c5197a34
SHA512202a3862bf26a9e3b839c38a30b62473bc4190b010fe54520ffb4ea10a2a0fbb424efa08df14c6df88bfb0669d48cb22e358bca374bbb1391055521d18bc875c
-
Filesize
1.8MB
MD5743ae689f70257d7a4ee703c6d9ba24b
SHA19e59fbb68179d85c56bc3a4c6e05d612b9a8436a
SHA25635d8eb1936b64a1baadfdf0e8aad44702346acae6b466217ebc09d4cbf2a69e4
SHA5129be7822139345914743ae4a5bc7c04e840592deeac8727a350c6d388a9e724d82f0c1b8ad96be77c2acbfa6065431450f24ca99bc9c50ad2fccd13fe924c0ff7
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e