Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 12:27
Static task
static1
Behavioral task
behavioral1
Sample
b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe
Resource
win7-20240903-en
General
-
Target
b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe
-
Size
1.8MB
-
MD5
c865fb303fdfddb29c023ce073e7253b
-
SHA1
a6675800ec3455acb3fd2ca32e44aa2ecefa37bf
-
SHA256
b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6
-
SHA512
266c57aa8b20eb7efd5eb7ae774cca13d9c5b19f7b82a4c3d1ead24e22a56e665c9ab11943a8c39fc0f790b28cb36c8324f5d53423f17a0a109c446ba82db55c
-
SSDEEP
49152:YPBpMeHWIffoauV/zG40Q9chE3uKyrDuvLMt6KN:YPBpMeHLfolX/cyuKyXcAUE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://push-hook.cyou
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://push-hook.cyou/api
https://occupy-blushi.sbs/api
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
https://disobey-curly.sbs/api
https://motion-treesz.sbs/api
https://powerful-avoids.sbs/api
Signatures
-
Amadey family
-
Cryptbot family
-
Detects CryptBot payload 1 IoCs
CryptBot is a C++ stealer distributed widely in bundle with other software.
resource yara_rule behavioral2/memory/316-120-0x0000000069CC0000-0x000000006A71B000-memory.dmp family_cryptbot_v3 -
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" aa72a1e2e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" aa72a1e2e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" aa72a1e2e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" aa72a1e2e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" aa72a1e2e5.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection aa72a1e2e5.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b070c2c00.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 552be3f8f4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a86694a22c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa72a1e2e5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 5908 chrome.exe 5132 chrome.exe 5764 chrome.exe 5760 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b070c2c00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b070c2c00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a86694a22c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 552be3f8f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a86694a22c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 552be3f8f4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa72a1e2e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa72a1e2e5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 6b070c2c00.exe -
Executes dropped EXE 15 IoCs
pid Process 5096 skotes.exe 3104 skotes.exe 1620 vg9qcBa.exe 2824 vg9qcBa.exe 3344 DPQSEDd.exe 3876 DPQSEDd.exe 316 6b070c2c00.exe 3952 552be3f8f4.exe 4716 a86694a22c.exe 2252 0b91a5b2a3.exe 6064 aa72a1e2e5.exe 5568 skotes.exe 5264 service123.exe 2064 skotes.exe 5552 service123.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 6b070c2c00.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 552be3f8f4.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine a86694a22c.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine aa72a1e2e5.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
Loads dropped DLL 2 IoCs
pid Process 5264 service123.exe 5552 service123.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features aa72a1e2e5.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" aa72a1e2e5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aa72a1e2e5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009288001\\aa72a1e2e5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\552be3f8f4.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009285001\\552be3f8f4.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\a86694a22c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009286001\\a86694a22c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0b91a5b2a3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009287001\\0b91a5b2a3.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cd3-134.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 2848 b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe 5096 skotes.exe 3104 skotes.exe 316 6b070c2c00.exe 3952 552be3f8f4.exe 4716 a86694a22c.exe 6064 aa72a1e2e5.exe 5568 skotes.exe 2064 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1620 set thread context of 2824 1620 vg9qcBa.exe 90 PID 3344 set thread context of 3876 3344 DPQSEDd.exe 94 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 5828 316 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b070c2c00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b91a5b2a3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DPQSEDd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a86694a22c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa72a1e2e5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language service123.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vg9qcBa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 552be3f8f4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 6b070c2c00.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 6b070c2c00.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2824 taskkill.exe 3920 taskkill.exe 1688 taskkill.exe 3796 taskkill.exe 3692 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings firefox.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3736 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2848 b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe 2848 b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe 5096 skotes.exe 5096 skotes.exe 3104 skotes.exe 3104 skotes.exe 316 6b070c2c00.exe 316 6b070c2c00.exe 3952 552be3f8f4.exe 3952 552be3f8f4.exe 4716 a86694a22c.exe 4716 a86694a22c.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 6064 aa72a1e2e5.exe 6064 aa72a1e2e5.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 6064 aa72a1e2e5.exe 6064 aa72a1e2e5.exe 6064 aa72a1e2e5.exe 5132 chrome.exe 5132 chrome.exe 5568 skotes.exe 5568 skotes.exe 2064 skotes.exe 2064 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 3 IoCs
pid Process 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 3920 taskkill.exe Token: SeDebugPrivilege 1688 taskkill.exe Token: SeDebugPrivilege 3796 taskkill.exe Token: SeDebugPrivilege 3692 taskkill.exe Token: SeDebugPrivilege 2824 taskkill.exe Token: SeDebugPrivilege 5064 firefox.exe Token: SeDebugPrivilege 5064 firefox.exe Token: SeDebugPrivilege 6064 aa72a1e2e5.exe Token: SeShutdownPrivilege 5132 chrome.exe Token: SeCreatePagefilePrivilege 5132 chrome.exe Token: SeShutdownPrivilege 5132 chrome.exe Token: SeCreatePagefilePrivilege 5132 chrome.exe -
Suspicious use of FindShellTrayWindow 57 IoCs
pid Process 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe 5132 chrome.exe -
Suspicious use of SendNotifyMessage 30 IoCs
pid Process 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 5064 firefox.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe 2252 0b91a5b2a3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5064 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2848 wrote to memory of 5096 2848 b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe 82 PID 2848 wrote to memory of 5096 2848 b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe 82 PID 2848 wrote to memory of 5096 2848 b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe 82 PID 5096 wrote to memory of 1620 5096 skotes.exe 88 PID 5096 wrote to memory of 1620 5096 skotes.exe 88 PID 5096 wrote to memory of 1620 5096 skotes.exe 88 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 1620 wrote to memory of 2824 1620 vg9qcBa.exe 90 PID 5096 wrote to memory of 3344 5096 skotes.exe 92 PID 5096 wrote to memory of 3344 5096 skotes.exe 92 PID 5096 wrote to memory of 3344 5096 skotes.exe 92 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 3344 wrote to memory of 3876 3344 DPQSEDd.exe 94 PID 5096 wrote to memory of 316 5096 skotes.exe 97 PID 5096 wrote to memory of 316 5096 skotes.exe 97 PID 5096 wrote to memory of 316 5096 skotes.exe 97 PID 5096 wrote to memory of 3952 5096 skotes.exe 98 PID 5096 wrote to memory of 3952 5096 skotes.exe 98 PID 5096 wrote to memory of 3952 5096 skotes.exe 98 PID 5096 wrote to memory of 4716 5096 skotes.exe 99 PID 5096 wrote to memory of 4716 5096 skotes.exe 99 PID 5096 wrote to memory of 4716 5096 skotes.exe 99 PID 5096 wrote to memory of 2252 5096 skotes.exe 101 PID 5096 wrote to memory of 2252 5096 skotes.exe 101 PID 5096 wrote to memory of 2252 5096 skotes.exe 101 PID 2252 wrote to memory of 3920 2252 0b91a5b2a3.exe 102 PID 2252 wrote to memory of 3920 2252 0b91a5b2a3.exe 102 PID 2252 wrote to memory of 3920 2252 0b91a5b2a3.exe 102 PID 2252 wrote to memory of 1688 2252 0b91a5b2a3.exe 105 PID 2252 wrote to memory of 1688 2252 0b91a5b2a3.exe 105 PID 2252 wrote to memory of 1688 2252 0b91a5b2a3.exe 105 PID 2252 wrote to memory of 3796 2252 0b91a5b2a3.exe 107 PID 2252 wrote to memory of 3796 2252 0b91a5b2a3.exe 107 PID 2252 wrote to memory of 3796 2252 0b91a5b2a3.exe 107 PID 2252 wrote to memory of 3692 2252 0b91a5b2a3.exe 109 PID 2252 wrote to memory of 3692 2252 0b91a5b2a3.exe 109 PID 2252 wrote to memory of 3692 2252 0b91a5b2a3.exe 109 PID 2252 wrote to memory of 2824 2252 0b91a5b2a3.exe 111 PID 2252 wrote to memory of 2824 2252 0b91a5b2a3.exe 111 PID 2252 wrote to memory of 2824 2252 0b91a5b2a3.exe 111 PID 2252 wrote to memory of 2956 2252 0b91a5b2a3.exe 113 PID 2252 wrote to memory of 2956 2252 0b91a5b2a3.exe 113 PID 2956 wrote to memory of 5064 2956 firefox.exe 114 PID 2956 wrote to memory of 5064 2956 firefox.exe 114 PID 2956 wrote to memory of 5064 2956 firefox.exe 114 PID 2956 wrote to memory of 5064 2956 firefox.exe 114 PID 2956 wrote to memory of 5064 2956 firefox.exe 114 PID 2956 wrote to memory of 5064 2956 firefox.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe"C:\Users\Admin\AppData\Local\Temp\b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"C:\Users\Admin\AppData\Local\Temp\1009238001\vg9qcBa.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"C:\Users\Admin\AppData\Local\Temp\1009278001\DPQSEDd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009283001\6b070c2c00.exe"C:\Users\Admin\AppData\Local\Temp\1009283001\6b070c2c00.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9222 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5132 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0x104,0x108,0x10c,0xe0,0x110,0x7fff14c6cc40,0x7fff14c6cc4c,0x7fff14c6cc585⤵PID:5152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1744,i,15902030492380061936,17610730380709988421,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1736 /prefetch:25⤵PID:5408
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2168,i,15902030492380061936,17610730380709988421,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:35⤵PID:1472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2248,i,15902030492380061936,17610730380709988421,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2212 /prefetch:85⤵PID:5472
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,15902030492380061936,17610730380709988421,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:5760
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,15902030492380061936,17610730380709988421,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3236 /prefetch:15⤵
- Uses browser remote debugging
PID:5764
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9222 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4456,i,15902030492380061936,17610730380709988421,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3644 /prefetch:15⤵
- Uses browser remote debugging
PID:5908
-
-
-
C:\Users\Admin\AppData\Local\Temp\service123.exe"C:\Users\Admin\AppData\Local\Temp\service123.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5264
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "ServiceData4" /tr "C:\Users\Admin\AppData\Local\Temp\/service123.exe" /st 00:01 /du 9800:59 /sc once /ri 1 /f4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3736
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 18564⤵
- Program crash
PID:5828
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009285001\552be3f8f4.exe"C:\Users\Admin\AppData\Local\Temp\1009285001\552be3f8f4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3952
-
-
C:\Users\Admin\AppData\Local\Temp\1009286001\a86694a22c.exe"C:\Users\Admin\AppData\Local\Temp\1009286001\a86694a22c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\1009287001\0b91a5b2a3.exe"C:\Users\Admin\AppData\Local\Temp\1009287001\0b91a5b2a3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:5064 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1924 -prefMapHandle 1916 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7d2515c7-7610-4eed-9053-3051a4ebf68e} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" gpu6⤵PID:224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2432 -prefMapHandle 2428 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {64d12530-9c52-4bc7-ba7d-febb345029b1} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" socket6⤵PID:4120
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3416 -childID 1 -isForBrowser -prefsHandle 3464 -prefMapHandle 3284 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8761be2d-9938-4ca6-964d-3fc697f9e882} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab6⤵PID:3304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2740 -childID 2 -isForBrowser -prefsHandle 3836 -prefMapHandle 3832 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b4b5324b-70a0-4037-bb8c-78c8568d349b} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab6⤵PID:3868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4716 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4704 -prefMapHandle 4700 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9e8f6f63-f49f-4ce8-a30b-ae3285b9396c} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" utility6⤵
- Checks processor information in registry
PID:5224
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5736 -childID 3 -isForBrowser -prefsHandle 5728 -prefMapHandle 5724 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65406dd4-b987-4e06-b890-d58f91e0fa56} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab6⤵PID:4952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5832 -childID 4 -isForBrowser -prefsHandle 5788 -prefMapHandle 5740 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {d1b5c10a-7a23-48ba-9785-13b5c956ad4a} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab6⤵PID:1576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5816 -childID 5 -isForBrowser -prefsHandle 5824 -prefMapHandle 5828 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1300 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f9a7bb42-bb79-4b01-acce-9c394781c4dc} 5064 "\\.\pipe\gecko-crash-server-pipe.5064" tab6⤵PID:4988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009288001\aa72a1e2e5.exe"C:\Users\Admin\AppData\Local\Temp\1009288001\aa72a1e2e5.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:5864
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 316 -ip 3161⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2064
-
C:\Users\Admin\AppData\Local\Temp\service123.exeC:\Users\Admin\AppData\Local\Temp\/service123.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:5552
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\activity-stream.discovery_stream.json
Filesize22KB
MD596ead8c02640dfaf4c31102a7d8435d1
SHA182614627c265b784da0de275579ec33961c5b745
SHA256c825d9821345f3659efaa747c9150a9e26db6c8bacaef541f2bec4ce55f390fd
SHA512c5be91c2d3b81a874299ddeab12e77206a9b6a85416c0bbc7e8da50f7bf4ce69f4c1f088a34849d03fecb9bf6c8610f021352b1a9fdbeaf2d944ee66c3d233b2
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n4zftpal.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD52b629c731c57443ae71b85cf8fbf27b6
SHA1ab18387f9f096c8583b244a8e638f0e0000ccbb1
SHA256a1223b2ecc28d72ff662a86b97c5b033b1a20924d0a5e55465612e1295390d96
SHA51207da01f2aafbe995dce703ba05f84587b347180f931f98a2980c6367930ceae72dce73a191d07e1bc7c0adfba8e67da7b0b02558194ae5dd85b6cc4596d00518
-
Filesize
460KB
MD520160349422aeb131ed9da71a82eb7ab
SHA1bb01e4225a1e1797c9b5858d0edf063d5f8bc44f
SHA256d8f6ce51eba058276c4722747655b68711682afc5654414e8c195ada38fdc0ea
SHA512907f3f61ac9ebeda534b3a330fd8673e8d09b243847b6a7a8d8d30f74ba8c699eafb8338a8d4f36824871609c1f226cb4db1e4a931fdf312f0e4331e7110c6b8
-
Filesize
458KB
MD5666df1d57e2a047b9edc5a7ad3525ea0
SHA192b4144346f873d5afc2e528f914afa6c7323fef
SHA256fcff3ae0e71747322f9c628736788ceb419c9f04bdfa8a5bdb3a628e8d91af6e
SHA5123a114e0c3412c8396f40191ebc24d44733f8ebf35b72ad3a4ed26691174de5292fe4213b72d1034262ff16616d5cf01703058a61c4a578773d16f728db082b1d
-
Filesize
4.2MB
MD507f6c03a0f56095a61508db221594a6b
SHA1e353abaad83c33aeba588d00796faf04b66e81e6
SHA2565c3bf18f03fb8c5c4d6b6301fc175b0e2b2196b7120795ff377053debee1a458
SHA51209f475523120d5f8f50f8608a89467d1d3dd00cfbd845ddd032c8a8dd58ac2a00475d1b0e5f0b2cebdcf7e7e3a5eb87fa869ff09bcdb102c0e59f555beeaf998
-
Filesize
1.8MB
MD5c6a72061965e0373199508608e5aea2f
SHA1dbe80cbff22d03c86a81e08e43a29c225abedf46
SHA256a0ce76ea885711405a8761ce1ce4a3099e99ccbe04d0957d181e9b0dc144db35
SHA51270a8bd3ba28eea029a44fea869c1a2a321c1291a77671be7a822d9ec4842787b56debcece4e9d50fddb5fc0ba9ee71531deecb1c29feb7711b9817d3a1c508d6
-
Filesize
1.7MB
MD576750efd1ca0208861f246d644e27524
SHA18e8ad0d59e15747047428daea9e78cb4f6fbbfbe
SHA2566a6139e53c1cff557fac7e0d1f66f6e8c4960aa73adac901f256c9144ba86756
SHA51263862bc0f3b9ba93734e9799f4458afd2eb93d7224aab0d9106863962f8ac5c8f16ac83174ea4f50be8e3c46c2bbe1eebb6c8a22580b4b3d9407cb18df9e2ba2
-
Filesize
900KB
MD59d35bcd49879abc69c8cad14c23f7890
SHA197d0eda7a24107fe638a4b77c348dd98a04a3566
SHA256ab9ba009d485575d06cc1942d54cf310b867213cd7f608a51d98f600fc1ee12f
SHA51203e49823fa1da603dc09c99fa2441745bf0dd8857a392d0e165be3b67d2713072b9ca94f3ebfb331d42455b2d624d636ceb021c862e373564f0a04113dcefd92
-
Filesize
2.7MB
MD5111171ebf74ebe23dbbd7de7e63204c4
SHA1621b826b386c5b496ace7c55b20952adeab86fc5
SHA25672b8decd2135ea6f3ac51f8e4731bda55c6212a7c79e30f9c5f68a206e17f80a
SHA512a1cd9fa36b0f07445349f5455bb66cbd425f2a51ee5e4fbce751f07b54240cf86e3ba66961bd2b3106dc0f725f921482303c7b785794e3d8cd1c093dfc042de1
-
Filesize
1.8MB
MD5c865fb303fdfddb29c023ce073e7253b
SHA1a6675800ec3455acb3fd2ca32e44aa2ecefa37bf
SHA256b8302d328e2db6dbbcd482126bdc9c5c4bd1892160fb5182807b2d9239e547a6
SHA512266c57aa8b20eb7efd5eb7ae774cca13d9c5b19f7b82a4c3d1ead24e22a56e665c9ab11943a8c39fc0f790b28cb36c8324f5d53423f17a0a109c446ba82db55c
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize8KB
MD54a468ccf8ff703144cd702336dac0209
SHA1e83140b9fdff110c3ef2fa8fa731bc21fa637a28
SHA25671c2d72d88e10f9200cc76230cdb3b450f01e99d945a1b1b730f506eb015dd2a
SHA51283198e764612ccd688793009bfc290377cb3e99963670544fff77d941110fd2c683f857ccaedffa01847d2e4b17874b55b61bcddaac7a5f387f3cd3e6e31a675
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\AlternateServices.bin
Filesize12KB
MD552c88f197b92e6c2c37fb3960b794086
SHA15d21acb1549349cda544d5a13e61fdec8383ccf3
SHA2567e21a91b4da40aa2d95cb07faed23d2f299d93d4fa35f66ad200fcab5d3d5e4e
SHA512792c82092e7aacea783f2ba934934df9d34eafda9f447d0b20f11722efa0376d3098fe3f2cd413614451a2e28e1907f8fc5634a18eaa4ce3cc8f5108a7e7ce59
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD56a14475d549e78b3dab61ba2321138a7
SHA1dea853db04e2513ebb443a796d0eb45bd5000304
SHA25612d7cc4711c04698013e899d6df24169109e166075bd322db52ae5e78d5ebdcf
SHA512366a80ede1d9fd7663f5818d4c388c6de56f4f887e291b41219672eeee0e4f3050a377bf1e53027d8972536d27141c6326d5c089fad73f8e7ec9db7d8ac8daef
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5bd5624925cc091a3c09cb5db2466c8c9
SHA1e021259ca76669bb26473617d2e42675206a578e
SHA25677c7d6f14288c1dfab01cc72e32e3c53fd166b4d3f0746d53b2efb5ac47d2416
SHA512b7dbc3c7ec08e5abeb7ad75ce2d2d24498d5efc2b37375df2ba34c3423bc6f6de0857c7ac06180d4246b879e4a510a260c5e611b7e2fd871fa49dcb0cfc496c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5fdb388ef78b2438d19dac15b7628611c
SHA1d7a8d05794d6ea6e440146922e3a86ef80f3a58f
SHA256dd9c4b490c18199f51d2d183065f0272f185f23634aaf8b67f70b7f139205ffa
SHA512cfd55ac4718addbbc6f3779842af421f98f186ab78755c9d84122969f8596af9fc43285701b533f76ebf44dc942ede3f7f3c0dd9970f22dd65cfbe845f3466bc
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5960466560eea902aaedcbd494f6ee7b0
SHA1cfedb2af81ff801855ecd222b232320690342baa
SHA2569a51bd9ef08767ca917453d7ad4e3131061f04f77aff29983a3f21f6ea07d859
SHA51209d0e61b703a920410183cbc484ef9d31a64b24f2787cad2a42710704e07ac8903fcd25cf183ece9dc9cc65bb31f88cc0f207fb7943a572e0fdc1b69fdc9f448
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\cafe1b7d-5022-41a7-95b4-c25a1023304c
Filesize27KB
MD59136234feb1a3974b34b0c3c4f833fad
SHA1d0e9cca85b3333ef5bcbc3c440bb77f61e41ae38
SHA2563b3f82f32e4c1916b16631a4e09c0a52ac62b7c5a3937846c2791e5c6a2ed01c
SHA51231b028dab9ed02941da1bd973308a419dbce7ba98aaa5d88607e3c52ca0fbd8f53c11ce2f9b3213d7234522c63fe83978b0fee462bca685411e7c9d04bd6d992
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\d667af18-a836-482c-8ba8-d650f749d011
Filesize982B
MD547cc30f21ef6ead0f51e95cc47f24796
SHA1f090f62509fc1a279f87dee10d1fcb0db7e53eef
SHA25665fdc5bcb8d4a9b9ba4da7e912933d569cd0ff3d6b227b40835941e13a60590c
SHA512235ae9b2b02977d05846965f3a879f5cbb7b6c13e7002b0ed89a1c829723a1e03a341c771820cbf7cd96137db3fe34fa01518a38877fd7a5bccdb2b741774b45
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\datareporting\glean\pending_pings\def00013-0d5f-4a0e-8b92-bda77f86d502
Filesize671B
MD5eea3e1e852486ba3d6aabb8e5f69299e
SHA194731aab9b39231f0b0fcc86980b52aeec944e56
SHA2560c02d76f55dcaca2e71af06942ebd4932750f8086c7ec6371942b3d7715854d3
SHA512b3680002b6e9e02012e4b72c43ef5bab50a55413c04225cc98b7a4eeaebab040c87c9015cf32845c7f97c48be7b4e61df7b86337bf3f42ae829df989046a3620
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD59a751b94b080ae1fba9759bf4e114cc1
SHA1507aa42bd562b0eafd37b5d78015af79ed3da310
SHA256128b26dfe6282f00de3b1faf7babf1e0585e5c13e1881abbf51fd4b9d819ad81
SHA512aaf805048149a87d3cad4e8ea786e20d02ff63eb123b4471470486915814fd7d0012220b542d89cbd4a889582b5e107918cf439843fb8356e03eea0995465517
-
Filesize
11KB
MD59411397bb075f8efc39bf8924782aa06
SHA11356ab2bb5e75fb8f5205d4188639bbe51cbdf4d
SHA256bed05ceec0018870d8e6d987e3c859df4a56f0124a0dd2489ad27467b04fa59e
SHA51228125b483fd24f68725d33158f134c4e1d8f120ac19f09a65f8d3e2e6e6b3e824df03e6e25f3e0087183b15701b0239563358a5c36e8c6dedc8ae1efa98e9bb7
-
Filesize
10KB
MD54d752e9e9265427d9e7fa0e8dcb50c89
SHA1439dccec416f4816c4c7a59057ee5f72ef9ae296
SHA2568e7922a8c427f56a5a6c7a8cd1b40662fc204166d7421d5d7fee59ccc276521f
SHA51279b72ded50daa42e1f8683ef0d44ab7fa8733ed1f09ce12f1e454526acaa26eab1202493d43376b356d5c82efdc5b080fb95d36de0e3ed80c008dda2e8acd377
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n4zftpal.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize2.0MB
MD54ae314a31276d8f7445255504679a57c
SHA1ad4d3ee6dbac1503500bf980c320c87d18fb855c
SHA25604d9f69f0379abab6bee74a06bccd956a102e62e2f47a7f49904f306f14544b4
SHA5126f965e062978e4d3a9b91b895dfe5523d27bdbe2a2f50a11556fb8378422aae9c80766cc4c2a738d8e2d754c264e3733257c767563b0831fe2bf4c0892a34a23