Analysis
-
max time kernel
145s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 14:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
7ee283f3588e385e0eb6c39a0a32ef38
-
SHA1
b5c51ee8ad56ea23acdfd03be4ba100261682134
-
SHA256
4a12b63197b69950e470f43b75d0df47eab18bb6c1a869c886b9b39f0b61b93a
-
SHA512
2c66020e9153446ef4bd9a03a788197136663af84c01352c706350053e6cbc748fb5eadacafeac969eb40d61c6e0485b63bccbd818500056fb5467b3bb0a5974
-
SSDEEP
24576:mNdd6AmJw0J/DcUKpPvt/fh60bDiw3rQsEVByKl5pAPxJHE+eHQGodJMJJP1TFR:uWJ7ApPVfhlbmaQsXKl8Pxu+ewrJkP
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
Processes:
93b7920ea6.exedescription ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 93b7920ea6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 93b7920ea6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 93b7920ea6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 93b7920ea6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 93b7920ea6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 93b7920ea6.exe -
Enumerates VirtualBox registry keys 2 TTPs 2 IoCs
Processes:
e64a388acc.exeebfd41d467.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF e64a388acc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF ebfd41d467.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
Processes:
e64a388acc.exe061ad5eeed.exeebfd41d467.exea31d74e9e0.exe6b5708dee8.exe93b7920ea6.exefile.exeskotes.exedescription ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e64a388acc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 061ad5eeed.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ebfd41d467.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a31d74e9e0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6b5708dee8.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 93b7920ea6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 4 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
Processes:
chrome.exechrome.exechrome.exechrome.exepid Process 1576 chrome.exe 1648 chrome.exe 1792 chrome.exe 2212 chrome.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
e64a388acc.exefile.exea31d74e9e0.exe93b7920ea6.exeebfd41d467.exeskotes.exe061ad5eeed.exe6b5708dee8.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e64a388acc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e64a388acc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a31d74e9e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a31d74e9e0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 93b7920ea6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ebfd41d467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 061ad5eeed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 061ad5eeed.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ebfd41d467.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6b5708dee8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6b5708dee8.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 93b7920ea6.exe -
Executes dropped EXE 12 IoCs
Processes:
skotes.exerWmzULI.exeSKOblik.exexZNk1YZ.exee64a388acc.exe061ad5eeed.exeebfd41d467.exeXsFuJt6.exea31d74e9e0.exe6b5708dee8.exe9514a29f69.exe93b7920ea6.exepid Process 2732 skotes.exe 2352 rWmzULI.exe 1880 SKOblik.exe 2804 xZNk1YZ.exe 2596 e64a388acc.exe 2100 061ad5eeed.exe 3668 ebfd41d467.exe 4072 XsFuJt6.exe 4204 a31d74e9e0.exe 2424 6b5708dee8.exe 2252 9514a29f69.exe 996 93b7920ea6.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
Processes:
e64a388acc.exe061ad5eeed.exeebfd41d467.exea31d74e9e0.exe6b5708dee8.exe93b7920ea6.exefile.exeskotes.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine e64a388acc.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 061ad5eeed.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine ebfd41d467.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a31d74e9e0.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 6b5708dee8.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 93b7920ea6.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe -
Loads dropped DLL 17 IoCs
Processes:
file.exeskotes.exeXsFuJt6.exe061ad5eeed.exepid Process 1732 file.exe 1732 file.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 4072 XsFuJt6.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2100 061ad5eeed.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Processes:
93b7920ea6.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 93b7920ea6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 93b7920ea6.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
skotes.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\93b7920ea6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010283001\\93b7920ea6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a31d74e9e0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010280001\\a31d74e9e0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\6b5708dee8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010281001\\6b5708dee8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\9514a29f69.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010282001\\9514a29f69.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral1/files/0x0005000000019467-1878.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
Processes:
file.exeskotes.exee64a388acc.exe061ad5eeed.exeebfd41d467.exea31d74e9e0.exe6b5708dee8.exe93b7920ea6.exepid Process 1732 file.exe 2732 skotes.exe 2596 e64a388acc.exe 2100 061ad5eeed.exe 3668 ebfd41d467.exe 4204 a31d74e9e0.exe 2424 6b5708dee8.exe 996 93b7920ea6.exe -
Drops file in Windows directory 1 IoCs
Processes:
file.exedescription ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Embeds OpenSSL 1 IoCs
Embeds OpenSSL, may be used to circumvent TLS interception.
Processes:
resource yara_rule behavioral1/files/0x0006000000016d36-402.dat embeds_openssl -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
061ad5eeed.exe6b5708dee8.exetaskkill.execmd.exetimeout.exeipconfig.exeebfd41d467.exetaskkill.exetaskkill.exetaskkill.exefile.exexZNk1YZ.exetaskkill.execmd.exee64a388acc.exeXsFuJt6.exea31d74e9e0.exe9514a29f69.exe93b7920ea6.exeskotes.exerWmzULI.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 061ad5eeed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b5708dee8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ebfd41d467.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xZNk1YZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e64a388acc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XsFuJt6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a31d74e9e0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9514a29f69.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93b7920ea6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rWmzULI.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
firefox.exerWmzULI.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rWmzULI.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString rWmzULI.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid Process 3760 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
chrome.exedescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid Process 3084 ipconfig.exe -
Kills process with taskkill 5 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid Process 3440 taskkill.exe 3796 taskkill.exe 1944 taskkill.exe 640 taskkill.exe 664 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
firefox.exedescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
Processes:
a31d74e9e0.exerWmzULI.exedescription ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 a31d74e9e0.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 rWmzULI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rWmzULI.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 rWmzULI.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 a31d74e9e0.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
file.exeskotes.exerWmzULI.exechrome.exee64a388acc.exe061ad5eeed.exeebfd41d467.exea31d74e9e0.exe6b5708dee8.exe9514a29f69.exe93b7920ea6.exepid Process 1732 file.exe 2732 skotes.exe 2352 rWmzULI.exe 2352 rWmzULI.exe 2352 rWmzULI.exe 1576 chrome.exe 1576 chrome.exe 2352 rWmzULI.exe 2352 rWmzULI.exe 2596 e64a388acc.exe 2596 e64a388acc.exe 2596 e64a388acc.exe 2596 e64a388acc.exe 2596 e64a388acc.exe 2596 e64a388acc.exe 2100 061ad5eeed.exe 3668 ebfd41d467.exe 3668 ebfd41d467.exe 3668 ebfd41d467.exe 3668 ebfd41d467.exe 3668 ebfd41d467.exe 3668 ebfd41d467.exe 4204 a31d74e9e0.exe 2424 6b5708dee8.exe 2252 9514a29f69.exe 996 93b7920ea6.exe 996 93b7920ea6.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 996 93b7920ea6.exe 996 93b7920ea6.exe -
Suspicious use of AdjustPrivilegeToken 21 IoCs
Processes:
chrome.exexZNk1YZ.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exefirefox.exe93b7920ea6.exedescription pid Process Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeShutdownPrivilege 1576 chrome.exe Token: SeDebugPrivilege 2804 xZNk1YZ.exe Token: SeDebugPrivilege 1944 taskkill.exe Token: SeDebugPrivilege 640 taskkill.exe Token: SeDebugPrivilege 664 taskkill.exe Token: SeDebugPrivilege 3440 taskkill.exe Token: SeDebugPrivilege 3796 taskkill.exe Token: SeDebugPrivilege 2288 firefox.exe Token: SeDebugPrivilege 2288 firefox.exe Token: SeDebugPrivilege 996 93b7920ea6.exe -
Suspicious use of FindShellTrayWindow 49 IoCs
Processes:
file.exechrome.exe9514a29f69.exefirefox.exepid Process 1732 file.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 1576 chrome.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2288 firefox.exe 2288 firefox.exe 2288 firefox.exe 2288 firefox.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe -
Suspicious use of SendNotifyMessage 13 IoCs
Processes:
9514a29f69.exefirefox.exepid Process 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2288 firefox.exe 2288 firefox.exe 2288 firefox.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe 2252 9514a29f69.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.exeskotes.exerWmzULI.exechrome.exedescription pid Process procid_target PID 1732 wrote to memory of 2732 1732 file.exe 30 PID 1732 wrote to memory of 2732 1732 file.exe 30 PID 1732 wrote to memory of 2732 1732 file.exe 30 PID 1732 wrote to memory of 2732 1732 file.exe 30 PID 2732 wrote to memory of 2352 2732 skotes.exe 33 PID 2732 wrote to memory of 2352 2732 skotes.exe 33 PID 2732 wrote to memory of 2352 2732 skotes.exe 33 PID 2732 wrote to memory of 2352 2732 skotes.exe 33 PID 2352 wrote to memory of 1576 2352 rWmzULI.exe 35 PID 2352 wrote to memory of 1576 2352 rWmzULI.exe 35 PID 2352 wrote to memory of 1576 2352 rWmzULI.exe 35 PID 2352 wrote to memory of 1576 2352 rWmzULI.exe 35 PID 1576 wrote to memory of 1716 1576 chrome.exe 36 PID 1576 wrote to memory of 1716 1576 chrome.exe 36 PID 1576 wrote to memory of 1716 1576 chrome.exe 36 PID 1576 wrote to memory of 1864 1576 chrome.exe 37 PID 1576 wrote to memory of 1864 1576 chrome.exe 37 PID 1576 wrote to memory of 1864 1576 chrome.exe 37 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2728 1576 chrome.exe 39 PID 1576 wrote to memory of 2880 1576 chrome.exe 40 PID 1576 wrote to memory of 2880 1576 chrome.exe 40 PID 1576 wrote to memory of 2880 1576 chrome.exe 40 PID 1576 wrote to memory of 2192 1576 chrome.exe 41 PID 1576 wrote to memory of 2192 1576 chrome.exe 41 PID 1576 wrote to memory of 2192 1576 chrome.exe 41 PID 1576 wrote to memory of 2192 1576 chrome.exe 41 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"C:\Users\Admin\AppData\Local\Temp\1010066001\rWmzULI.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6739758,0x7fef6739768,0x7fef67397785⤵PID:1716
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:1864
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=148 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:25⤵PID:2728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1516 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:85⤵PID:2880
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1604 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:85⤵PID:2192
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2316 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1648
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2324 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1388 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:25⤵PID:1236
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9223 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1324 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2212
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3700 --field-trial-handle=1280,i,1975645837069569313,12961129381896666319,131072 /prefetch:85⤵PID:2228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 10 & rd /s /q "C:\ProgramData\FCFBFBFBKFID" & exit4⤵
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Windows\SysWOW64\timeout.exetimeout /t 105⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"C:\Users\Admin\AppData\Local\Temp\1010230001\SKOblik.exe"3⤵
- Executes dropped EXE
PID:1880
-
-
C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"C:\Users\Admin\AppData\Local\Temp\1010264001\xZNk1YZ.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release4⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:3084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010276001\e64a388acc.exe"C:\Users\Admin\AppData\Local\Temp\1010276001\e64a388acc.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\1010277001\061ad5eeed.exe"C:\Users\Admin\AppData\Local\Temp\1010277001\061ad5eeed.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100
-
-
C:\Users\Admin\AppData\Local\Temp\1010278001\ebfd41d467.exe"C:\Users\Admin\AppData\Local\Temp\1010278001\ebfd41d467.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\1010279001\XsFuJt6.exe"C:\Users\Admin\AppData\Local\Temp\1010279001\XsFuJt6.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Users\Admin\AppData\Local\Temp\1010280001\a31d74e9e0.exe"C:\Users\Admin\AppData\Local\Temp\1010280001\a31d74e9e0.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:4204
-
-
C:\Users\Admin\AppData\Local\Temp\1010281001\6b5708dee8.exe"C:\Users\Admin\AppData\Local\Temp\1010281001\6b5708dee8.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\1010282001\9514a29f69.exe"C:\Users\Admin\AppData\Local\Temp\1010282001\9514a29f69.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2252 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3796
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:1248
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2288 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.0.672096441\886087645" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5b37efa7-4f1c-487c-9c4d-89d5dc262c38} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 1300 110ce858 gpu6⤵PID:4952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.1.1449654138\2061303630" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {fb887ad7-23e6-48aa-9d1b-0ddb86526b58} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 1500 d71e58 socket6⤵PID:2784
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.2.1685407859\1239845753" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 2076 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b45e0e8-31fc-4c21-99a5-fd0018b72e73} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 2100 19084058 tab6⤵PID:4332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.3.1847722620\2056807410" -childID 2 -isForBrowser -prefsHandle 2888 -prefMapHandle 2884 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d81a10a9-d478-4015-9c03-882e5d1a4f41} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 2900 1ca69058 tab6⤵PID:4812
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.4.442821189\1285881481" -childID 3 -isForBrowser -prefsHandle 3812 -prefMapHandle 3808 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {25eafc0d-60a0-4d6f-aabd-3e89b6b26b76} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 3824 21123a58 tab6⤵PID:352
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.5.1861449981\1478461855" -childID 4 -isForBrowser -prefsHandle 3952 -prefMapHandle 3956 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4c80f0f7-ee9b-4e99-9a5f-08a11b043e54} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 3940 21125858 tab6⤵PID:336
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2288.6.1431286889\2077390554" -childID 5 -isForBrowser -prefsHandle 4132 -prefMapHandle 4136 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5933b355-6722-4d23-bf46-42b6c00fbb40} 2288 "\\.\pipe\gecko-crash-server-pipe.2288" 4120 20a1b258 tab6⤵PID:3036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010283001\93b7920ea6.exe"C:\Users\Admin\AppData\Local\Temp\1010283001\93b7920ea6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:996
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2900
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56f0c522caa8bc31b12c0388bc850f9a0
SHA1926038295b0329247db9c387bf1bc28c8bcfa39e
SHA25614fec2dccfd9329028c2368172964cdebbc1f885a85c9c10035a8d3f1cdb76fe
SHA512ee74f4b16b28fa7c4c598473e3b7dd71360154d7cbd08628fb1ce4c62de5c741867615147be0979941fc2bde675f988368580575aa249b694b0358871d8e2a6a
-
Filesize
16B
MD5aefd77f47fb84fae5ea194496b44c67a
SHA1dcfbb6a5b8d05662c4858664f81693bb7f803b82
SHA2564166bf17b2da789b0d0cc5c74203041d98005f5d4ef88c27e8281e00148cd611
SHA512b733d502138821948267a8b27401d7c0751e590e1298fda1428e663ccd02f55d0d2446ff4bc265bdcdc61f952d13c01524a5341bc86afc3c2cde1d8589b2e1c3
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD533ec6d2944a5d801e45580b42ba2b8cf
SHA1aa9746c1152b31b42693a88e9fe63a7491615768
SHA256853c596f611fd486bd8a315df5e2c731194af28d52e86dfd4bc2e044dd3c9e1c
SHA51206308bb8c7ba52a6bea1c85700977ebc5865559accee9e90e0498599b5d195f8eccbf9c8c0514aaa0f6f5bd9d4bcfc6d1d4623e2878f39f9b938480209896623
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
16.7MB
MD5ef4b5e4dbb0c0cd9c261b1ca7a90e1f1
SHA1916f9b604f06c0879624e5b0da50c845f8881e34
SHA256b84004b60d9ee0ef798bcc43f8344f06bc775198e04b707eb98f79d6260895f2
SHA512af86b1e0eebcfc246d80be6882b55dfcb1f1594e846a584faa49ef7cf7f9f8f1c58e4607805bb474ff5ec8bf5265eb1d8e8ca490bd444196970794b9a632930d
-
Filesize
21.2MB
MD5c3968e6090d03e52679657e1715ea39a
SHA12332b4bfd13b271c250a6b71f3c2a502e24d0b76
SHA2564ad1cc11410e486d132dce9716eebe6a2db0af0fcbf53ee87bc9c0af6a5aa1d4
SHA512f4908cce3e77a19bcbdc54487e025868cbd2c470b796edbf4a28aebc56cb9212019496f32eb531787de2ca9e8af0aedab2fde3d7aecee9e6a3fe3f5e4ce7670a
-
Filesize
4.9MB
MD5f98fb3f06debf7144bee7c2ff7b4c456
SHA1854b9f051af8fe2ebdd2878411e9fb9032594229
SHA2568abb86b3dd80c4d37387eb28a3c96efc7c0ef1675337aeb8e5599e8e3140ee66
SHA512d7fca0fc58d14066fbddb19f36d5b1ff17d51a5aa85f8829cba212d1aa3fd7f5551ff3c673bc6e5e64888951f9066e536f91d6671f7ef45765a815a677eedcb1
-
Filesize
4.2MB
MD524733346a5bbfd60cd2afd7915b0ac44
SHA196b697c75295f2d5049c2d399d740c478c40c459
SHA256f3b0734a5bf6ec2a77a02657e770842456f510980314765bef61ed367f4afc4d
SHA512e0ad7c18eff4ee66c7857caea5091f6fefb5a7cd3c5bbaf6d47d54a73e4467700c232301e828f325ec76ed36fc1628d532fab9dceaae1704e444623a8bf69d35
-
Filesize
1.9MB
MD59b37c373d075d185b0979498d9ac7c7c
SHA14d4c3862ba6f1e3a35195ca2d9b23c80a7632eda
SHA256d52ec59339c5ed5f8b09550f85368f07e6652471f564118d1b9995cdf834c76c
SHA512d30077e2e087b114f75b0b9083ff4b6ea252b4ec5f5aa2f5674d5799c1c94e7dbb2637e1de8b0b0af238d285e089973b2bb18cb5be9cba6eaee519fdc5bf1495
-
Filesize
4.3MB
MD55b893b6b754f3f28e703ffedd654f6b7
SHA19ac4666663f290ff010c787f6c26b6c80254fd35
SHA256bc959fde662ca2876e219ef21cb9e5280054fd83c54b366dfba33a7a7ed88285
SHA512e2c99a579402a9c070bcdc90af3b4394278d3481be40fe278fa6629132cd35547cd95d37a9ca5bba9f6dae35b5e1a83de8945b499eb876fd47011f3627f6d807
-
Filesize
689KB
MD5c599f242f50ba9963752f3f31e2e1f94
SHA1f7f8cb1c748390dd731e039739d63749b27c9d4b
SHA2560156be519792dcc5f7c2f3f69c5a7aa79f0c5e479d210dddc77a0a35749c9b2d
SHA5120cf5d6e712d274c592447081486ce5375a38d11747897a141f603073544669fd630b29e81f7e0048f8202ca7801e01b34b9b8e93b0fbfc74e05aa27866584999
-
Filesize
1.8MB
MD53956fb8d6e7d4415e6db6e1017968553
SHA1b5649a18471cae04b254300a6661b9d72de3a247
SHA256bac60c389a78658476edda33546a0127bb58593cc584f0ef5866de6085e63c7c
SHA5128464f26dc3b80519d6e6a985953831e22000799715b5a2747b44a7fe0683d85d7601f0407865940757afa80eb260c05c855861fb01168b168579635b2f6a0a10
-
Filesize
1.7MB
MD5b65136f4c830127bc5acf711ca4cc846
SHA18aaa79a4bd70c2d0b0cff1de9f907bd8c0e516d5
SHA256cf3ed6778e5518ea1b8aed29de098cf5d9b919ed4e5de555f1c906f65677766b
SHA512e0c46b912593e0e9c2501be21c70fa402a23c8f77e727089758804c19d1bc0f5bed18eb6e49170a44ad42b83254d524ed3766df9362579ef0ee8dacda20e7628
-
Filesize
900KB
MD58d1cebab0f792541d9f5d520efa671b1
SHA124a8eea5c5b71b50386e4a8406561463835fcf42
SHA256b78673d9b3e5ac6f7bb33d9f5d3386cb72e550df93feafbb99fd3ab9b8236c1a
SHA5122cc7bf95c6616d39a52c74def88fd2a9b2f1e65a77556ed504e774e957f61f775eaec8075858a96b7afdbc8ea1ef98800f532bc96f5ff0b1f963a6c8cbff5cd0
-
Filesize
2.7MB
MD5f63f6461c513303dbd4fdcedd1772a74
SHA11a9c084f9ba3ee4e039b65e02bbb0ddc574b4539
SHA2562ddb9dc529f8bd218efd18048ea721e0e169ea34c1e4bd5a2dba9fe38a516f1f
SHA5129721d9dd9874fee05ff16a774ceb2131ce144ff33c3717abe48a849b76f8a686122bb3f69bdd3217a4fbf80c1c079b3211284ba0c02457aaee6c9e65ad3cd5b5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD57ee283f3588e385e0eb6c39a0a32ef38
SHA1b5c51ee8ad56ea23acdfd03be4ba100261682134
SHA2564a12b63197b69950e470f43b75d0df47eab18bb6c1a869c886b9b39f0b61b93a
SHA5122c66020e9153446ef4bd9a03a788197136663af84c01352c706350053e6cbc748fb5eadacafeac969eb40d61c6e0485b63bccbd818500056fb5467b3bb0a5974
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5771accbb9d02205a7bb8844b363725f6
SHA1b1c42746b3610d9fb41c4f2aadb2395b64092bf9
SHA256c1b9103b92cc81c8f1ee11ea0a86e3c6dbbec6c14c3fa689a33886fc9871a0de
SHA5128f9340bf3094fe269bed2630e5eaa1838156b6f357253b0f54494dc7a7af9e1c39170e6690184e24cea28cc34c93b5e7e9aa3e850edd94e8278e4780ab7a3c1b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\a5910468-f0dd-4309-9c76-709aec69e827
Filesize12KB
MD5edbee0a7f5b57e1f442701681fade875
SHA1a70d5624efe9bf1f0dc4131f64ac00a9c8899d14
SHA256e9152a7fc653b08036462ca23fac4897d80d18cf23c3059a49e3f45bfdd2aa52
SHA5123810bb9fe702264f3f9ed88b6d1e6a55019bbb221a72d85b3c9cd5193ad64e625c3b067139c34df5d0efc605657cc6f40e8715f799b85d0bd21b618e821c55c5
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\a68ccd14-2cb1-4a1e-9d3b-0cf85b81a2f4
Filesize745B
MD5cd89ac578ff9b30351793fc79b412ceb
SHA1cb4899fac7596cb3d5661b281a90c78c7a5b8e3d
SHA256e302496ac596ea91956f0e940679c5ece466f51187f87550d30ad12e5ce70a31
SHA512719db47f7a407aacf0392a8abe857a1b5d1f8414530644172ba93714fc9089f96c54d4656a05a57d2ea422577debecd7243be3f65ad707b907ba5a0811c9e454
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5dc0526a5da13933dabf1f2173409c614
SHA127c87efb7b2e951a14c32c4290d29e401d42bae3
SHA256ff15139c2657ba663d4679a9bc93cc158cd910adb356ed9539fd4f3bddcdd8d3
SHA5123a5a80d0173fc9ed63a9dfea3d7768a2f842ca92ca7b5e3f7f624eb316faef6e4846c7553a64bf5cdb8bfbe4132f4c5701ed1862a1e09af4873d89e9287550ee
-
Filesize
6KB
MD56955241edc6108a500827b65aeef5095
SHA13b81dc5909dbf75722177f208f13a79f9448559a
SHA256365bcbb6efee1b41d8a1237dc5b21dbcc11133917916f6b3c80bf50da424f92f
SHA512f47cfeedf1f2e8da2e9f0f7d221aa8d0eb3a52828f67ed48de71a790975c4c9f0e69aaa4b98464cb358f3427a7b064c20def85d41c1eb34a475acdabbdb855c2
-
Filesize
7KB
MD5f81cd02197ac791925a89560da3fa3bf
SHA1fd7b3d6407de81b5fdd9b456bb2af104c09dd808
SHA2563f833f1dc5eff587c74fedda53933f842181d37d00b7775984015fcb1d043842
SHA5121dd98f4fd72bf575959e651e7502c6716c46198c24fd31d11241bba5c5c3756111c29ddc4503d58deafae014ca950d27c2e7ab1d0d020a3257747b87b141e4bc
-
Filesize
7KB
MD590a355fbd8612eb5669734ca465999e4
SHA14e60ac3d68ec28b0a4c6d82290e3e445c965cd61
SHA2568acb4fd0d626c3f4538836f5e199c4f002c8a05df4fd3dc9a87afcfd31f95a9b
SHA512c533c4cb87606feb28c0c1607d3f4ecb46323d6f7bdf5951ab2c6f41227334f8d160af742749a1d8c0e5db349b18fda6ff8a7a88769f7aa228080ed8a03219c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5393e328a7169dcc65b6b5c1089ca5465
SHA1a6f0378d3ee418f6373d6060d91e06bb561edfb1
SHA25645f1209711f5aebb034c979d4eb8714cd147f0b222252bf7bbb71cd913c15257
SHA5121dd02a659d861e52cde9306621ab318e4ba5ddafc32af31496e891209455802c2d2adb86e82e8b97220eb3cf1a19beb566206a10d7697ff3e2265795489c2a13
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd
-
Filesize
440KB
MD5b8a69fcd2a37e7b7bd1be816e3727f6e
SHA1bf9fbbeefdb15167e00e1b23d1dc04d0f410baea
SHA256aa7594e60fe4f662bdd4d3213d97a3170193a42607d96d9de43717982eaa663b
SHA51276aabcc435ea8c7d6f00d0685097fe5cf68f0a1645403be8e9314a0755574c63b24a820f60870aa20920e03134670b58dbdb420085a348c42cc2de5c0deba9ea