Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe
Resource
win7-20240903-en
General
-
Target
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe
-
Size
1.9MB
-
MD5
055a7c8f105841970689bb5abc2d03cf
-
SHA1
ce89a053e1465aada62d9aa7fd456fe7c48bc21b
-
SHA256
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8
-
SHA512
768b5de7c2ab491da837b5a75508055750054abb3fb428e2d8bed7cc170fb15060e01f4ea46de680838f150c1376fead072912f1a9a1fd72ba44b6c9d212edad
-
SSDEEP
24576:aAwurUWaZHIZSK/ag12afzghGH1W1hOzHkzpBRnMAj6t+6mkiebg3LHtXagbRicE:n1AZg2gnzCwk0o+Aj6vmTGqXVJeh
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs
https://motion-treesz.sbs
https://disobey-curly.sbs
https://leg-sate-boat.sbs
https://story-tense-faz.sbs
https://blade-govern.sbs
https://occupy-blushi.sbs
https://frogs-severz.sbs
https://property-imper.sbs
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://blade-govern.sbs/api
https://story-tense-faz.sbs/api
Signatures
-
Amadey family
-
Lumma family
-
Processes:
a09b2dd910.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a09b2dd910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a09b2dd910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a09b2dd910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a09b2dd910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a09b2dd910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a09b2dd910.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exe403f78ec41.exefcbb070975.exea09b2dd910.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 403f78ec41.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fcbb070975.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a09b2dd910.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
skotes.exe403f78ec41.exefcbb070975.exea09b2dd910.exeaf556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 403f78ec41.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fcbb070975.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a09b2dd910.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fcbb070975.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a09b2dd910.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 403f78ec41.exe -
Executes dropped EXE 5 IoCs
Processes:
skotes.exe403f78ec41.exefcbb070975.exee5ca312776.exea09b2dd910.exepid Process 2804 skotes.exe 1048 403f78ec41.exe 1988 fcbb070975.exe 1648 e5ca312776.exe 844 a09b2dd910.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exe403f78ec41.exefcbb070975.exea09b2dd910.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 403f78ec41.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine fcbb070975.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a09b2dd910.exe -
Loads dropped DLL 6 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exepid Process 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe -
Processes:
a09b2dd910.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a09b2dd910.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a09b2dd910.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a09b2dd910.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009490001\\a09b2dd910.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\403f78ec41.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009487001\\403f78ec41.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\fcbb070975.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009488001\\fcbb070975.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\e5ca312776.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009489001\\e5ca312776.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0005000000019467-70.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exe403f78ec41.exefcbb070975.exea09b2dd910.exepid Process 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 2804 skotes.exe 1048 403f78ec41.exe 1988 fcbb070975.exe 844 a09b2dd910.exe -
Drops file in Windows directory 1 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exedescription ioc Process File created C:\Windows\Tasks\skotes.job af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exefcbb070975.exee5ca312776.exetaskkill.exetaskkill.exetaskkill.exe403f78ec41.exetaskkill.exetaskkill.exea09b2dd910.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fcbb070975.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5ca312776.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 403f78ec41.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a09b2dd910.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 1948 taskkill.exe 1712 taskkill.exe 1464 taskkill.exe 2432 taskkill.exe 2084 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exe403f78ec41.exefcbb070975.exee5ca312776.exea09b2dd910.exepid Process 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 2804 skotes.exe 1048 403f78ec41.exe 1988 fcbb070975.exe 1648 e5ca312776.exe 844 a09b2dd910.exe 1648 e5ca312776.exe 844 a09b2dd910.exe 844 a09b2dd910.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exea09b2dd910.exedescription pid Process Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 1464 taskkill.exe Token: SeDebugPrivilege 2432 taskkill.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 1720 firefox.exe Token: SeDebugPrivilege 1720 firefox.exe Token: SeDebugPrivilege 844 a09b2dd910.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exee5ca312776.exefirefox.exepid Process 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1720 firefox.exe 1720 firefox.exe 1720 firefox.exe 1720 firefox.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe -
Suspicious use of SendNotifyMessage 12 IoCs
Processes:
e5ca312776.exefirefox.exepid Process 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1720 firefox.exe 1720 firefox.exe 1720 firefox.exe 1648 e5ca312776.exe 1648 e5ca312776.exe 1648 e5ca312776.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exeskotes.exee5ca312776.exefirefox.exefirefox.exedescription pid Process procid_target PID 2384 wrote to memory of 2804 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 31 PID 2384 wrote to memory of 2804 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 31 PID 2384 wrote to memory of 2804 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 31 PID 2384 wrote to memory of 2804 2384 af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe 31 PID 2804 wrote to memory of 1048 2804 skotes.exe 33 PID 2804 wrote to memory of 1048 2804 skotes.exe 33 PID 2804 wrote to memory of 1048 2804 skotes.exe 33 PID 2804 wrote to memory of 1048 2804 skotes.exe 33 PID 2804 wrote to memory of 1988 2804 skotes.exe 35 PID 2804 wrote to memory of 1988 2804 skotes.exe 35 PID 2804 wrote to memory of 1988 2804 skotes.exe 35 PID 2804 wrote to memory of 1988 2804 skotes.exe 35 PID 2804 wrote to memory of 1648 2804 skotes.exe 36 PID 2804 wrote to memory of 1648 2804 skotes.exe 36 PID 2804 wrote to memory of 1648 2804 skotes.exe 36 PID 2804 wrote to memory of 1648 2804 skotes.exe 36 PID 1648 wrote to memory of 1948 1648 e5ca312776.exe 37 PID 1648 wrote to memory of 1948 1648 e5ca312776.exe 37 PID 1648 wrote to memory of 1948 1648 e5ca312776.exe 37 PID 1648 wrote to memory of 1948 1648 e5ca312776.exe 37 PID 1648 wrote to memory of 1712 1648 e5ca312776.exe 39 PID 1648 wrote to memory of 1712 1648 e5ca312776.exe 39 PID 1648 wrote to memory of 1712 1648 e5ca312776.exe 39 PID 1648 wrote to memory of 1712 1648 e5ca312776.exe 39 PID 1648 wrote to memory of 1464 1648 e5ca312776.exe 41 PID 1648 wrote to memory of 1464 1648 e5ca312776.exe 41 PID 1648 wrote to memory of 1464 1648 e5ca312776.exe 41 PID 1648 wrote to memory of 1464 1648 e5ca312776.exe 41 PID 1648 wrote to memory of 2432 1648 e5ca312776.exe 43 PID 1648 wrote to memory of 2432 1648 e5ca312776.exe 43 PID 1648 wrote to memory of 2432 1648 e5ca312776.exe 43 PID 1648 wrote to memory of 2432 1648 e5ca312776.exe 43 PID 1648 wrote to memory of 2084 1648 e5ca312776.exe 45 PID 1648 wrote to memory of 2084 1648 e5ca312776.exe 45 PID 1648 wrote to memory of 2084 1648 e5ca312776.exe 45 PID 1648 wrote to memory of 2084 1648 e5ca312776.exe 45 PID 1648 wrote to memory of 1868 1648 e5ca312776.exe 47 PID 1648 wrote to memory of 1868 1648 e5ca312776.exe 47 PID 1648 wrote to memory of 1868 1648 e5ca312776.exe 47 PID 1648 wrote to memory of 1868 1648 e5ca312776.exe 47 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1868 wrote to memory of 1720 1868 firefox.exe 48 PID 1720 wrote to memory of 1644 1720 firefox.exe 49 PID 1720 wrote to memory of 1644 1720 firefox.exe 49 PID 1720 wrote to memory of 1644 1720 firefox.exe 49 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 PID 1720 wrote to memory of 2848 1720 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe"C:\Users\Admin\AppData\Local\Temp\af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1009487001\403f78ec41.exe"C:\Users\Admin\AppData\Local\Temp\1009487001\403f78ec41.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\1009488001\fcbb070975.exe"C:\Users\Admin\AppData\Local\Temp\1009488001\fcbb070975.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
-
C:\Users\Admin\AppData\Local\Temp\1009489001\e5ca312776.exe"C:\Users\Admin\AppData\Local\Temp\1009489001\e5ca312776.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.0.1075451192\2088525681" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {700f3190-ed19-4a0e-a570-51f4f2b31607} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 1300 44de858 gpu6⤵PID:1644
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.1.216624228\1911485254" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f1e3a916-bc28-4a1e-b30c-bce37ca05f32} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 1504 e74e58 socket6⤵PID:2848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.2.1510476619\1465854945" -childID 1 -isForBrowser -prefsHandle 2072 -prefMapHandle 2068 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ec3a4c24-de51-4869-89b9-774bed1ca1d0} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 2084 1adce458 tab6⤵PID:2836
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.3.1985174704\589584907" -childID 2 -isForBrowser -prefsHandle 2832 -prefMapHandle 2828 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {057c9766-4895-48ed-892e-044f536cbd9e} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 2844 e64b58 tab6⤵PID:2016
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.4.1320526602\1225783019" -childID 3 -isForBrowser -prefsHandle 3776 -prefMapHandle 3772 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ddf66bc1-8b60-4890-b4e9-8af074c7a535} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 3788 21ae9d58 tab6⤵PID:948
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.5.2108194067\1416758081" -childID 4 -isForBrowser -prefsHandle 3960 -prefMapHandle 3964 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {90f72a8f-ed1c-4bd6-9ce9-519db85e30c8} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 3948 213de858 tab6⤵PID:2460
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1720.6.593076973\1262595912" -childID 5 -isForBrowser -prefsHandle 4048 -prefMapHandle 4052 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a7b9898f-390a-4a58-be25-770fb8aeb10f} 1720 "\\.\pipe\gecko-crash-server-pipe.1720" 4036 213df158 tab6⤵PID:2100
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009490001\a09b2dd910.exe"C:\Users\Admin\AppData\Local\Temp\1009490001\a09b2dd910.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD5540350d13b5afb754ac939eecd6bf6cd
SHA1ff1526d96ea0927e8ed05f5ede582d2073197996
SHA2565c23610f4e71dc704a06b58979b5d20561f6767e7e814bbd7847caf2005fe964
SHA512a45019087dee0ba11abfcd09c440cdf2b7b0f02846fa6aac24ae7fe8f5c59d9e820e3a32c19774b87dcd7b3f968826e88ed748b44a8b89dcbbc52b0602f2df54
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD54d590c2e2723f4ddad39983cfcd016e0
SHA17820b528b791f5bc0a6f648e1abcdcf153d0584d
SHA256f2c1208026df174002f01a627d04e9dedc0722b40736fadaea5573dcb1dd7ad4
SHA512920ca5ced1d710acdae75f3fa643355ebf99c4d107a8afce30e4c7377e5b7a230a8a49d978ffdb84d706adb37045028b9f005f354b3a9362e1a5bdc711b31eb2
-
Filesize
1.7MB
MD5957d1a37c48a91e2b68183a1b8071f17
SHA158a65738f2c90b1c3dbce666d254c25eb7ffc181
SHA256807edadaf8265da90820759a2d1c60a9962ad6dd515f0d18ac4696c8a4bf4ca6
SHA5129d8b73940116417bebcf78bdc2fbe69e20591163259a9e64b1341d503c5c206a619cf1b7dff65c094e4f9d8f7eab86bfed3686b25c3f4a80a7f2d01c652fca22
-
Filesize
900KB
MD5f4890b6809d98b2a6be0764fc93e0670
SHA102a007f7744929d56586a319102deaca67a4ae55
SHA256439224970ca8cf83f01947f69fca52645e57beddc8fd61a214a4b961b1b6bd52
SHA51266d084ab650dbd4d11109e00084ea544a6e9ed747d7552d50a860e5de5e2c46b3ce33c31ca8c2c01734b887f0e32e469d9c89e758ca54fbc6764127867d42738
-
Filesize
2.7MB
MD57c5c84a24fb15ffff1d92b6e72efa101
SHA14ad29785c9168995ad616b799314f53b25552a75
SHA256112dfbf128000bb2106853e51a73b90dd5441e94bb9fae7b1cc44345baae229a
SHA512ff2ac1545cc37deaeb6f9c1ffa6a062842dccd1f9c1e67ccb443136ac87af8b61d23bff000e7d39bdbac1eee5c9a3958355ae6fa3944dcb503c048332598f859
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5d3039cd73d7a5c6759f516af4e78defd
SHA107e76e78681af21010861b75909a7f45fc197e89
SHA256fd8c8e6f66f5d9707dc0095e6e638a9a8c33c2d5fb31f84f55d041cd111f064b
SHA512f9d3246efea7561e82c51ac63281fa777aadb6da959427cd625c871627377115a49e8e34534d4630e11e43ab495902c3db27cd9b8ffd0eece467174196a22ce6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\043b3df9-3c3e-4b3e-88c9-e07c8d5d33cd
Filesize733B
MD590a61e2a6edf993f830eff55d227b66d
SHA1a3b71cac3779b716ec0b5cea074d051b75ae1552
SHA256140a60ffd13f0d0074276ba59ef5ce19dd7d30db196962148274d5efc12a056b
SHA512000674ec2cbfdbbd76bcd560f069c8545011f4fed8ab2914b75249a079a725a3e76d749cd0a197b8de72e47c15a4ea285f825d3d7453f81fda53023b67a4a0b9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD53a892d9c006ccdeafe73a8f93cb89912
SHA1d297bad49db283200cbfb87cb9f8d3c01dbbbe82
SHA256d908c8d729662703bdf52f4966abf237b5015b334db45c0d0610312b65e63b9f
SHA51213a3a14285ffdb1ba91146a99e66806d5cf2982fef56d9fd093dd05ec46c18ad8417ee0600e9d116df489005b629ae83e77ed1dd8959fbed386d0db6b50ca4f2
-
Filesize
7KB
MD58c7f6b1f1d7baa44710cbbc7bf944ae9
SHA1ee62888e0110382560304bb1361878fa8a33b821
SHA256dcd61318732de60a2dd9276cb3bc80ca0063de27af89d1b80b1345be7a4cc5d3
SHA512a51e6aa82c99899aec1dcdbe660091276947eee2d7dc1ec519f07198153c58a671f6ef60110feb5bc1d8b763300611d212928a4f9550a956204657f6ec5d3254
-
Filesize
7KB
MD5524f635bf1771b1105cfd62f817e031b
SHA173cbc2034cd96ed1e4893ad0a5cfa27f85d5e7d2
SHA256936a20a7582693176276532a6e418de6ae782835054fe1d6703d567f3fcba6fc
SHA512092088f019c33c585d3a929df0d98414d3d749c47a7c999adc5eb4eec19e1d5db68de5dcc52448c8fbcc8ad83ffb734951ae0d22f38777f6eaa1f2a2b8b588aa
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD522b9b2bd491a60b324c0e2e5143f03f1
SHA193a1e1b7a7237e94397317857dc2178d283f6f86
SHA2567f7dd8d5fc2f1346a0415cbf77abc1b4364242ce7b887bb1e168c9070f01543c
SHA51267a6d031b48db874ea83758fb1469d691acd41824bf8ce853a21d3a1ae3f6c3dae02e1a68501cab3807d54be58baaac97bdb584e8dea1d9e509ecd32a51759ce
-
Filesize
1.9MB
MD5055a7c8f105841970689bb5abc2d03cf
SHA1ce89a053e1465aada62d9aa7fd456fe7c48bc21b
SHA256af556c029dc19dd60c72dfd25a39e6b28fc848c9f9c4414d3bdf52c2e589aaf8
SHA512768b5de7c2ab491da837b5a75508055750054abb3fb428e2d8bed7cc170fb15060e01f4ea46de680838f150c1376fead072912f1a9a1fd72ba44b6c9d212edad