Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 02:52
Static task
static1
General
-
Target
0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe
-
Size
7.1MB
-
MD5
05c7e7195dbaac2ea5a9134ed18f2a24
-
SHA1
dd21fd691c40d85c73690713902b780a7ac4a454
-
SHA256
0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce
-
SHA512
73164a2a866517427ba090232e5ad6bbf24bfad35d97c39ee347e7c9e015ac845fc465a52cdaf6f9cedcfd752cf42fa7ce97c1ab6636b6c692b7ec08b480be71
-
SSDEEP
196608:eAD2Vl1Y/dcCPR9AE0VLtBw4xh9Wv+Ig7A:eES1Y6wvULzw4r9Lj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral1/memory/5024-3811-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 9e41528de6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 9e41528de6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 9e41528de6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 9e41528de6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 9e41528de6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4d921l.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b46d21bc25.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6acca75545.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9e41528de6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1W47n3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2T6257.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h78O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4d921l.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 874284be68.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 396 chrome.exe 6084 chrome.exe 2720 chrome.exe 2388 chrome.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h78O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b46d21bc25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 874284be68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1W47n3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2T6257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6acca75545.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6acca75545.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9e41528de6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1W47n3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h78O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b46d21bc25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2T6257.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4d921l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4d921l.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 874284be68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9e41528de6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 1W47n3.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation b46d21bc25.exe -
Executes dropped EXE 16 IoCs
pid Process 1800 v7P08.exe 4004 o5u43.exe 4544 1W47n3.exe 2700 skotes.exe 5052 2T6257.exe 1572 3h78O.exe 1064 4d921l.exe 5024 b46d21bc25.exe 1972 874284be68.exe 5096 6acca75545.exe 4588 930960dfc1.exe 4436 9e41528de6.exe 1188 skotes.exe 5616 skotes.exe 5308 service123.exe 6796 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 9e41528de6.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 4d921l.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 6acca75545.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine b46d21bc25.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 874284be68.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 1W47n3.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2T6257.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 3h78O.exe -
Loads dropped DLL 1 IoCs
pid Process 5308 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 9e41528de6.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4d921l.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4d921l.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\930960dfc1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009187001\\930960dfc1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9e41528de6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009188001\\9e41528de6.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v7P08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" o5u43.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\874284be68.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009185001\\874284be68.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6acca75545.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009186001\\6acca75545.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0008000000023c6d-114.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 4544 1W47n3.exe 2700 skotes.exe 5052 2T6257.exe 1572 3h78O.exe 1064 4d921l.exe 5024 b46d21bc25.exe 1972 874284be68.exe 5096 6acca75545.exe 4436 9e41528de6.exe 1188 skotes.exe 5616 skotes.exe 6796 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1W47n3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3456 5024 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b46d21bc25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6acca75545.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e41528de6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1W47n3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 874284be68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v7P08.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h78O.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4d921l.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language o5u43.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2T6257.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 930960dfc1.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString b46d21bc25.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 b46d21bc25.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 232 taskkill.exe 4520 taskkill.exe 4908 taskkill.exe 636 taskkill.exe 3080 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 4544 1W47n3.exe 4544 1W47n3.exe 2700 skotes.exe 2700 skotes.exe 5052 2T6257.exe 5052 2T6257.exe 1572 3h78O.exe 1572 3h78O.exe 1064 4d921l.exe 1064 4d921l.exe 5024 b46d21bc25.exe 5024 b46d21bc25.exe 1064 4d921l.exe 1064 4d921l.exe 1972 874284be68.exe 1972 874284be68.exe 5096 6acca75545.exe 5096 6acca75545.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4436 9e41528de6.exe 4436 9e41528de6.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4436 9e41528de6.exe 4436 9e41528de6.exe 4436 9e41528de6.exe 1188 skotes.exe 1188 skotes.exe 2388 chrome.exe 2388 chrome.exe 5616 skotes.exe 5616 skotes.exe 6796 skotes.exe 6796 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 1064 4d921l.exe Token: SeDebugPrivilege 3080 taskkill.exe Token: SeDebugPrivilege 232 taskkill.exe Token: SeDebugPrivilege 4520 taskkill.exe Token: SeDebugPrivilege 4908 taskkill.exe Token: SeDebugPrivilege 636 taskkill.exe Token: SeDebugPrivilege 740 firefox.exe Token: SeDebugPrivilege 740 firefox.exe Token: SeDebugPrivilege 4436 9e41528de6.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeShutdownPrivilege 2388 chrome.exe Token: SeCreatePagefilePrivilege 2388 chrome.exe Token: SeDebugPrivilege 740 firefox.exe Token: SeDebugPrivilege 740 firefox.exe Token: SeDebugPrivilege 740 firefox.exe -
Suspicious use of FindShellTrayWindow 59 IoCs
pid Process 4544 1W47n3.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe 2388 chrome.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 740 firefox.exe 4588 930960dfc1.exe 4588 930960dfc1.exe 4588 930960dfc1.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 740 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1800 1980 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 82 PID 1980 wrote to memory of 1800 1980 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 82 PID 1980 wrote to memory of 1800 1980 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 82 PID 1800 wrote to memory of 4004 1800 v7P08.exe 83 PID 1800 wrote to memory of 4004 1800 v7P08.exe 83 PID 1800 wrote to memory of 4004 1800 v7P08.exe 83 PID 4004 wrote to memory of 4544 4004 o5u43.exe 84 PID 4004 wrote to memory of 4544 4004 o5u43.exe 84 PID 4004 wrote to memory of 4544 4004 o5u43.exe 84 PID 4544 wrote to memory of 2700 4544 1W47n3.exe 85 PID 4544 wrote to memory of 2700 4544 1W47n3.exe 85 PID 4544 wrote to memory of 2700 4544 1W47n3.exe 85 PID 4004 wrote to memory of 5052 4004 o5u43.exe 86 PID 4004 wrote to memory of 5052 4004 o5u43.exe 86 PID 4004 wrote to memory of 5052 4004 o5u43.exe 86 PID 1800 wrote to memory of 1572 1800 v7P08.exe 92 PID 1800 wrote to memory of 1572 1800 v7P08.exe 92 PID 1800 wrote to memory of 1572 1800 v7P08.exe 92 PID 1980 wrote to memory of 1064 1980 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 93 PID 1980 wrote to memory of 1064 1980 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 93 PID 1980 wrote to memory of 1064 1980 0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe 93 PID 2700 wrote to memory of 5024 2700 skotes.exe 96 PID 2700 wrote to memory of 5024 2700 skotes.exe 96 PID 2700 wrote to memory of 5024 2700 skotes.exe 96 PID 2700 wrote to memory of 1972 2700 skotes.exe 97 PID 2700 wrote to memory of 1972 2700 skotes.exe 97 PID 2700 wrote to memory of 1972 2700 skotes.exe 97 PID 2700 wrote to memory of 5096 2700 skotes.exe 98 PID 2700 wrote to memory of 5096 2700 skotes.exe 98 PID 2700 wrote to memory of 5096 2700 skotes.exe 98 PID 2700 wrote to memory of 4588 2700 skotes.exe 99 PID 2700 wrote to memory of 4588 2700 skotes.exe 99 PID 2700 wrote to memory of 4588 2700 skotes.exe 99 PID 4588 wrote to memory of 3080 4588 930960dfc1.exe 100 PID 4588 wrote to memory of 3080 4588 930960dfc1.exe 100 PID 4588 wrote to memory of 3080 4588 930960dfc1.exe 100 PID 4588 wrote to memory of 232 4588 930960dfc1.exe 102 PID 4588 wrote to memory of 232 4588 930960dfc1.exe 102 PID 4588 wrote to memory of 232 4588 930960dfc1.exe 102 PID 4588 wrote to memory of 4520 4588 930960dfc1.exe 104 PID 4588 wrote to memory of 4520 4588 930960dfc1.exe 104 PID 4588 wrote to memory of 4520 4588 930960dfc1.exe 104 PID 4588 wrote to memory of 4908 4588 930960dfc1.exe 106 PID 4588 wrote to memory of 4908 4588 930960dfc1.exe 106 PID 4588 wrote to memory of 4908 4588 930960dfc1.exe 106 PID 4588 wrote to memory of 636 4588 930960dfc1.exe 108 PID 4588 wrote to memory of 636 4588 930960dfc1.exe 108 PID 4588 wrote to memory of 636 4588 930960dfc1.exe 108 PID 4588 wrote to memory of 1556 4588 930960dfc1.exe 110 PID 4588 wrote to memory of 1556 4588 930960dfc1.exe 110 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 1556 wrote to memory of 740 1556 firefox.exe 111 PID 740 wrote to memory of 4928 740 firefox.exe 112 PID 740 wrote to memory of 4928 740 firefox.exe 112 PID 740 wrote to memory of 4928 740 firefox.exe 112 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe"C:\Users\Admin\AppData\Local\Temp\0128acee92388482eee4ef5c15eb4eb2d943ddd55d5c0d8e8fee4121dbeb75ce.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7P08.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v7P08.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5u43.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\o5u43.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1W47n3.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1W47n3.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\1009184001\b46d21bc25.exe"C:\Users\Admin\AppData\Local\Temp\1009184001\b46d21bc25.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"7⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2388 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x160,0x164,0x168,0x13c,0x16c,0x7ffef3c3cc40,0x7ffef3c3cc4c,0x7ffef3c3cc588⤵PID:4588
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1832,i,11543856879226269583,16023391659223330678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1828 /prefetch:28⤵PID:1596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2024,i,11543856879226269583,16023391659223330678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2084 /prefetch:38⤵PID:5344
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2128,i,11543856879226269583,16023391659223330678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2328 /prefetch:88⤵PID:5540
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3228,i,11543856879226269583,16023391659223330678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3252 /prefetch:18⤵
- Uses browser remote debugging
PID:396
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3412,i,11543856879226269583,16023391659223330678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3344 /prefetch:18⤵
- Uses browser remote debugging
PID:6084
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3232,i,11543856879226269583,16023391659223330678,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4628 /prefetch:18⤵
- Uses browser remote debugging
PID:2720
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5308
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f7⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5304
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5024 -s 13527⤵
- Program crash
PID:3456
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009185001\874284be68.exe"C:\Users\Admin\AppData\Local\Temp\1009185001\874284be68.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1972
-
-
C:\Users\Admin\AppData\Local\Temp\1009186001\6acca75545.exe"C:\Users\Admin\AppData\Local\Temp\1009186001\6acca75545.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5096
-
-
C:\Users\Admin\AppData\Local\Temp\1009187001\930960dfc1.exe"C:\Users\Admin\AppData\Local\Temp\1009187001\930960dfc1.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T7⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:636
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking7⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking8⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2004 -parentBuildID 20240401114208 -prefsHandle 1920 -prefMapHandle 1912 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {541d4e4d-f7a8-4385-84db-440ff823f32f} 740 "\\.\pipe\gecko-crash-server-pipe.740" gpu9⤵PID:4928
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2456 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2420 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {932c2d55-6001-48f1-9f65-329649c3cca3} 740 "\\.\pipe\gecko-crash-server-pipe.740" socket9⤵PID:3336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1232 -childID 1 -isForBrowser -prefsHandle 3248 -prefMapHandle 3244 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ca995763-8589-434e-b074-66ab3a1241d6} 740 "\\.\pipe\gecko-crash-server-pipe.740" tab9⤵PID:4648
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3712 -childID 2 -isForBrowser -prefsHandle 3696 -prefMapHandle 2884 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dd4a6799-f625-4b97-bfd1-9f9591cc019d} 740 "\\.\pipe\gecko-crash-server-pipe.740" tab9⤵PID:5044
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4488 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4452 -prefMapHandle 4332 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c128088b-c182-4daa-840b-d9ba9004073d} 740 "\\.\pipe\gecko-crash-server-pipe.740" utility9⤵
- Checks processor information in registry
PID:6164
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 3 -isForBrowser -prefsHandle 5136 -prefMapHandle 5476 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9db2eebd-b5ec-4162-8c36-baeda7c4e73c} 740 "\\.\pipe\gecko-crash-server-pipe.740" tab9⤵PID:2584
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5740 -childID 4 -isForBrowser -prefsHandle 5748 -prefMapHandle 5752 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {99c2a440-7516-4ef8-9f27-dcaeccdd7a26} 740 "\\.\pipe\gecko-crash-server-pipe.740" tab9⤵PID:4520
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5956 -childID 5 -isForBrowser -prefsHandle 5612 -prefMapHandle 5624 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 936 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8534e387-7c02-4c09-8be1-78aae2fe226a} 740 "\\.\pipe\gecko-crash-server-pipe.740" tab9⤵PID:4604
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009188001\9e41528de6.exe"C:\Users\Admin\AppData\Local\Temp\1009188001\9e41528de6.exe"6⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T6257.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2T6257.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h78O.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h78O.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d921l.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4d921l.exe2⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1064
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5616
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5024 -ip 50241⤵PID:3428
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6796
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD58348d6462247bda370ee36a628873d65
SHA114f9e29ce2f1bd474897fb47c845faf8407778e8
SHA256a6788ddb23ec974744e98ff6697b715675a8b97c77fedd4afc04087c28dbae98
SHA512842a83f0bb04d0e639b922c38b58832cec11300f831229370b11fc3e0561be844adee69608a2c8805e4367b424ceecc1b4f78f2e75bf429d1d62f4a9ab799aca
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\y0bypz8z.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5327b009ca55923702dd6b857255056ac
SHA180caefd697ee28610adbf32c720966e0742b7a32
SHA25613bfb01217dd53767674042001c3f3a3c15abddeeae0609cb9c71c2df2c0ecfa
SHA512e8623adb4c0db163e36762657278dd5c405424241e314a2e16229b553ee998725529c495363a84e4697debeed9bd7c5d3d547d56555db6f2c43b1819bd19c462
-
Filesize
4.2MB
MD50681851640b935b4a9425e967cac0370
SHA17331dc9b49c56fbd7d2e750d5b181515257619a0
SHA25649961a2d21872034f17208c7367930061eed9d68a33f1859553808e3afdc3fb5
SHA5120ab754dc8dcf2b07bb89d1cb033a9ea0c931396c11f454bc8e77b211cb90b4623df6558e02a01969947126f006639afaba90f98c17a97f1f39638b7c605ffdfc
-
Filesize
900KB
MD59fb4e0bb119c4d11df5d85d5e6ae59e2
SHA16b9c74ccd77c7608f51bc73414542fa598aa969f
SHA256171a0fc521c16921300ebce67d0cef9acaeeea8e6f151610ca5f5015b1fe92da
SHA51238f3ef4f38534036a6714830bfb0516e5a0bf17f0c178ffa46646861fdac3efe5ae59bceb3617a8ba71f872ca11e8aa516d066c3e23eb970099bf74afe33e092
-
Filesize
2.7MB
MD5ff4097a40d0d37512378cf195110f686
SHA13d1155fb8e8e9b7523386c17b861e9e317fdcbfb
SHA2567677a92e1ca020c6be89ef67309db3770899b692f312e7b955168596dedd9e47
SHA512ac99b642130760d2dbd1492437418c225e486e1b8af11febcfeb587003d0ce66cbae4bf78fe30405c04cb4b2fe93ccdb439d64edf0e014ccb5b372adb3b2fe58
-
Filesize
5.5MB
MD5795d9c40e685c3b6f8641239447fc998
SHA1ea93914be5e9a597e0e19659e9f7d3d837d59d58
SHA256d8649f5ccbc85ea304ec61ba13b6f8274e4271ac3e59849a2026d6c8a6c64720
SHA512fe311d16e4dca1c9733ce0c75fa3f8a5e26ab140ccb4081f60d95737cf92f800decb0de73fea25691662443d55f868f45b47daeb4fb535b54d344636f287e63a
-
Filesize
1.7MB
MD5ed7c5463807aadb8f9a29da98de85541
SHA18bbf942e682157725b804fa8eb872e8926fdf27f
SHA2562d819fe3a7fd77aa5e76d170914b0721ad7b71c3694fb93b86420f3103c05aaa
SHA5121e52886cbbd8c7442c83b7be062f350e1d8f55098e3ed3495252d3adca56fa233d237005278762e32da21914b76e971f825ddf6d7b029f9d9d16383ac32483ce
-
Filesize
3.7MB
MD57e2fd8ce59e7d62b1ec9cd96c706f68a
SHA1047dc782414d441faccb85e01b000f7bafa5f424
SHA2564c249182f10837666a354e2516d50681a3d4f8e74c100fca98d33f70e85c5cc3
SHA5122383ad1078047681bc3cf07713c59347a62942dfc3d2e145801327cde902b62b31af6ffc87259925a21d7f2b73f4a43404bd9486fa1941e555417289c4a3bfe1
-
Filesize
1.8MB
MD543b480566333c8bef7d574be4f19c982
SHA112c6de1951ba03cef3303be5013d8b8a32bc2072
SHA2560ca07c7d504a96196b0b91ca59a5133f4fc5f122f9986f2cfa2599cdc60ae74b
SHA5120dc02fa1c712a227b6e82787bbd52ad6a7247b8bd58e89318c99a8570d617a38444d52553a2bee394e25ade98088111259e1ec3e0fbb720158dff63c88b98d93
-
Filesize
1.8MB
MD5d3898add2004689239baf9b29bad208c
SHA11ef5c797efed6085774c5feaf73578e940d5d5a4
SHA256f2192a397429bd4c7e5c13b3832627265eda3774239ca19f66be38911c6612ca
SHA5121c4ee0e00dcfe7a070efc1e687af2b436e019447dd4252d8c0cd2de2448baf9506995af74798f6ff52c44838ff5052a1d83567ce4f3fd07c7659b683aad1f76c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize18KB
MD501c63ab3c88304ff1d84aed1909c8228
SHA11139eaf426afa0e7cd13b6d7e0a387bd8d6ad2a3
SHA2569d79eb55266ae1dbf28d613a420d40ff6004597c19f2770c4ab42f1ea2bcfc25
SHA51258da159ba93f55586f52386da5a3b58fe0f6db690a7676bbd7165eda0f0bf86355f702be19dddd8b4bbab974affcfca2d1140bb1e934d0895065b590f7b49005
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\AlternateServices.bin
Filesize10KB
MD5a3968fa9fa982b3712035245fafea206
SHA11b74da1e0dac5b68ca6e5c895e0d84545fdaea3c
SHA256973c9b33cab17f37ea0a59d1df1fea4cd946bb335ad5c398cd7345472c580d4d
SHA51255ef76f5192a8742f6f1ffc75ae6c1c82d34af34fa666f9d6bad98c2db3cf3085973e55d6564fefe8ea2f8e8dbba84373102954af1e7d4751e6ba11abba5dcb5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize22KB
MD56ec45ff7110b6a140d78e0a577fb4d80
SHA1e8891b3018de7014c97c5a6e643c68ae8372bd19
SHA256db20cd34a778854fb0a7aa5a7c9fdcfa462a17837d662a71ecf47b0ac380ddc1
SHA512a09829cbd8488569a58e3b67e05abeb18a2c5cfe0fbee9d5ca774b6fbb2a383c8bcaa681c044c74e63336445e14f2fc24dc6ad2a6dd7549ede53b2eb8c710248
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD595db4e855cf52a61f870cf805b71378f
SHA11928f206a0bb214ad8ea762658666945ca5fd75e
SHA2568b2871abb24796ff1cb3bebab2421b1a27c33f542baaf57529cf3c4adea0ee69
SHA512224ff975f46ee33bf5cc779e90962d26165e049f3b30ae170d6e5bdec7f020c48c0ddf13cdb70d377134b5a7a965fff6e4fb9ab980af6376138c4177f45565d5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize24KB
MD59f63b2a4c808a31a3da6b6e3e06c70df
SHA1c3e298588853a0bf3b672d7bb0328192167428ab
SHA2569e77511cd6758fd0096e8d557b2927c681eb97cc261f7bae5b6c06ecf42ec20d
SHA512afc82ba1a3e14a2873533fc4b5032b6f0c70d0c63fc30272f0a72f76abb97accc0d1649e507603345706e2f52896f806e9af4650bbdaa731ff15a16d8bbd0303
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.bin
Filesize23KB
MD54c39b948d28a43825165178838e70f7c
SHA1c86da9faebe1575fe67d6d817d3854de10e53a03
SHA2565fc8b797766266b72b21ff674e502cedbfbde23a9785cf0df0e2d0c87caa8e48
SHA512cb07df9933503dcf15d39772982100535e0ef0e6cd30aa212e27ac997ed12f5ee3976489897ef6be3eafa18651cea59c68ef25f178081c287aef7f810323fbe9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5934ecd287b589bfe999b6d5b032e31fd
SHA17ad4ef98011ed2acec666b2ce7945db011aa186c
SHA2566662df7eab0b36cb9bce48610fd4266140e826593b5965448f2e91dd7099822b
SHA512f658d21ece548d95254be6c9c27f303cb175a6a762e33e954536e405686e4dc3eede8cb6e9f9c51e454d0789389f2c8f5aac21545f9c7659a1fcae5b93d22adf
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5c8daba2cd4538770b9f3c629ee9ea438
SHA1d18ad318bd7102d8a3ee4a82146efc994d0d1bdb
SHA2560ce140831f535c9836cc8e90a1b72c6c3cc65ae929ce150bf8732df127981c17
SHA512c77213f045d0f72a09a59e61c06c6a820453e36a8a40785c4e225d9436f224735752821327118c2b7c8f00c0364ab4c4110bb34c71ee0719371e960c48267d45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5aff55975ff9f6a1019711c9de88d2a2e
SHA1746578d2f1f17718da681d99d5cbb864b275e067
SHA2563cb6261329a84649f7eb90ed583eb74bbeee10b1b4aeed4caa9380a8165324eb
SHA5128e000524aca3165f52821fcf70664151dd5691cc33da4a16aeb5eee86a4c175a701effeb8c60375d582fe2629d75af5f4fed2dfc564a4931acfbb3a5c374d654
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5e83bcdef932fe287c8b11bc8e3b2dbbf
SHA1414ac45d184e26f00f6e97c99827c9498c13245c
SHA256e0789037c4985316e51332970754911fd82647a4ae304cf5870096845c499bc3
SHA512210ce9d75e48dfc8efd96809b09dd6b480d8853b6319d24e38b065eef642e877d56de59bc251ca6a19961288311b831242f3b8d01a789b61fe67c016ef5d5f0b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\4cebc01b-6a18-40dc-9db5-0ff2e8a71e9d
Filesize982B
MD5122a1a7a37e3d6b094992951b412ebe7
SHA1a9973255b3d1e384e36a43a54819732ad5ae0f3f
SHA256807d4fd86994d2677d4cb9c930d46897494d94ad52cce3aa4952a3252e194acf
SHA512f94d396a43f674131bf448fd4c8850ee7278cb7ad47e6475457c1d90bb8912c2e708231464aac920e026821bddf0d2fa70914f99f5476f2bc25af306912be522
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\datareporting\glean\pending_pings\77669765-341f-4a40-8ac0-93318e808dbb
Filesize659B
MD5e79b488e67e8a3809b5ef7f32ac2ddec
SHA1b104f11c0025670d5e939d5af79a8bdb61048c6a
SHA256c2e8a9aab7a59e6ac54efca69fac32592cb45644ee8ffc9cc60210e64f6d5417
SHA5122b1661eac749c9754fbf61ce48d6cd38dc32b333693b4fab36a9e5650ab2dfa076611b282c0c10b17aeb32afe949dec0725bea141798391da4750172ead23a83
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\y0bypz8z.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD57df37a1cb22b61fcf4dda2cc44f89e12
SHA189e36eb7c720a2f19392909ba26b98b166817023
SHA256e1a4a8dff11dd00d370c6c9023b47adbe5d51692353b4b47ca6479a73c4ec27a
SHA512361b0d00a23f7370ba7d2fe10a876ca6498723fd853f73ad73c70f5ec14503d0c9b208179408551443bffc46a9cc8cb89c9a87a2ae5078fd4df237b253531fe9
-
Filesize
15KB
MD58632eabfeb1117f119bd08e2c5dcd1de
SHA1baa2eb9e4505ecec8b5cdb77af63765868a3ec3c
SHA256f4bfe9fd4e1e17251a4e6774af1e7723c4b5e56f6ca32ce015b79fb13a30914e
SHA512d174f54266b8a4cc7e589965fd4726446260c59cc8301087cb33a970eac54e61c54d62e76454511936f781fa557aa038e1ac7479985d2f6b67855df94d57c528
-
Filesize
10KB
MD5a782a6d6b9e313a125c48813e0ca5a79
SHA11a31c3220c9e4dd44d1eabe2ecca846f7c5be0ca
SHA256dd4a13dbb7468fa7456a2cbfab9fe8c3f52f03b1eb2f06040f2b7c475bc8a70a
SHA512010cb7b3dbe39bab3ac25cca8f260956d6091bad9c6fa32d4f11a2dc338a41eb3f905a7bb12f6de638f7eb6a88e4b5dbb605e523010f208093048e2a266040ac
-
Filesize
10KB
MD5938b6083f8ae30c32f0aa583f9ca4916
SHA1219b30e621b30a48f192a369a9eca4e36e2d6729
SHA25605a3eb04f287050a42f0d39a1994e7bacb11277ff5ae266c2fc444b8be39c2b1
SHA5124f7be2604cf8973737fed8cc0ccd29cdfe6e08453c96e83cb69df0526eb2da7d796f633a15d207b483eb1e82d929b62685e8ec9e9d8de56e8da377c88eb7fbc1