Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01-12-2024 13:58
Static task
static1
Behavioral task
behavioral1
Sample
11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe
Resource
win7-20240903-en
General
-
Target
11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe
-
Size
1.8MB
-
MD5
53a52f91ea488da325331b1f7152509e
-
SHA1
731b2c54e2b49ee60c88ca02f072de81675ef54f
-
SHA256
11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854
-
SHA512
6f850a678667c1f3803f09bae526f38478df7449f799386e0d927daeacf20c4878e92843c415eed179686ddf20af752a6957e2ca67f13ae615cf475b472e7d0b
-
SSDEEP
49152:ZGaS6+C/fVgOUerB1CrbP5lKKokFL4OAY4:caS6+C/f6OzS/Pu/O4
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" a91349f62c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" a91349f62c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" a91349f62c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" a91349f62c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" a91349f62c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection a91349f62c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfe1773f45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a71e16de5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a91349f62c.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfe1773f45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a71e16de5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a91349f62c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a91349f62c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfe1773f45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a71e16de5e.exe -
Executes dropped EXE 5 IoCs
pid Process 2256 skotes.exe 1492 cfe1773f45.exe 1516 a71e16de5e.exe 2896 ceaa2b8d7e.exe 2304 a91349f62c.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine cfe1773f45.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a71e16de5e.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine a91349f62c.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe -
Loads dropped DLL 8 IoCs
pid Process 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 2256 skotes.exe 2256 skotes.exe 2256 skotes.exe 2256 skotes.exe 2256 skotes.exe 2256 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features a91349f62c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" a91349f62c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\cfe1773f45.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010975001\\cfe1773f45.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a71e16de5e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010976001\\a71e16de5e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\ceaa2b8d7e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010977001\\ceaa2b8d7e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\a91349f62c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1010978001\\a91349f62c.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001945c-73.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 2256 skotes.exe 1492 cfe1773f45.exe 1516 a71e16de5e.exe 2304 a91349f62c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfe1773f45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a71e16de5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a91349f62c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ceaa2b8d7e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 856 taskkill.exe 1164 taskkill.exe 608 taskkill.exe 872 taskkill.exe 532 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 cfe1773f45.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 cfe1773f45.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 cfe1773f45.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 2256 skotes.exe 1492 cfe1773f45.exe 1516 a71e16de5e.exe 2896 ceaa2b8d7e.exe 2304 a91349f62c.exe 2304 a91349f62c.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2304 a91349f62c.exe 2304 a91349f62c.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 856 taskkill.exe Token: SeDebugPrivilege 1164 taskkill.exe Token: SeDebugPrivilege 608 taskkill.exe Token: SeDebugPrivilege 872 taskkill.exe Token: SeDebugPrivilege 532 taskkill.exe Token: SeDebugPrivilege 2260 firefox.exe Token: SeDebugPrivilege 2260 firefox.exe Token: SeDebugPrivilege 2304 a91349f62c.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2260 firefox.exe 2260 firefox.exe 2260 firefox.exe 2260 firefox.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2260 firefox.exe 2260 firefox.exe 2260 firefox.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe 2896 ceaa2b8d7e.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1728 wrote to memory of 2256 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 31 PID 1728 wrote to memory of 2256 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 31 PID 1728 wrote to memory of 2256 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 31 PID 1728 wrote to memory of 2256 1728 11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe 31 PID 2256 wrote to memory of 1492 2256 skotes.exe 33 PID 2256 wrote to memory of 1492 2256 skotes.exe 33 PID 2256 wrote to memory of 1492 2256 skotes.exe 33 PID 2256 wrote to memory of 1492 2256 skotes.exe 33 PID 2256 wrote to memory of 1516 2256 skotes.exe 34 PID 2256 wrote to memory of 1516 2256 skotes.exe 34 PID 2256 wrote to memory of 1516 2256 skotes.exe 34 PID 2256 wrote to memory of 1516 2256 skotes.exe 34 PID 2256 wrote to memory of 2896 2256 skotes.exe 35 PID 2256 wrote to memory of 2896 2256 skotes.exe 35 PID 2256 wrote to memory of 2896 2256 skotes.exe 35 PID 2256 wrote to memory of 2896 2256 skotes.exe 35 PID 2896 wrote to memory of 856 2896 ceaa2b8d7e.exe 36 PID 2896 wrote to memory of 856 2896 ceaa2b8d7e.exe 36 PID 2896 wrote to memory of 856 2896 ceaa2b8d7e.exe 36 PID 2896 wrote to memory of 856 2896 ceaa2b8d7e.exe 36 PID 2896 wrote to memory of 1164 2896 ceaa2b8d7e.exe 39 PID 2896 wrote to memory of 1164 2896 ceaa2b8d7e.exe 39 PID 2896 wrote to memory of 1164 2896 ceaa2b8d7e.exe 39 PID 2896 wrote to memory of 1164 2896 ceaa2b8d7e.exe 39 PID 2896 wrote to memory of 608 2896 ceaa2b8d7e.exe 41 PID 2896 wrote to memory of 608 2896 ceaa2b8d7e.exe 41 PID 2896 wrote to memory of 608 2896 ceaa2b8d7e.exe 41 PID 2896 wrote to memory of 608 2896 ceaa2b8d7e.exe 41 PID 2896 wrote to memory of 872 2896 ceaa2b8d7e.exe 43 PID 2896 wrote to memory of 872 2896 ceaa2b8d7e.exe 43 PID 2896 wrote to memory of 872 2896 ceaa2b8d7e.exe 43 PID 2896 wrote to memory of 872 2896 ceaa2b8d7e.exe 43 PID 2896 wrote to memory of 532 2896 ceaa2b8d7e.exe 45 PID 2896 wrote to memory of 532 2896 ceaa2b8d7e.exe 45 PID 2896 wrote to memory of 532 2896 ceaa2b8d7e.exe 45 PID 2896 wrote to memory of 532 2896 ceaa2b8d7e.exe 45 PID 2896 wrote to memory of 2292 2896 ceaa2b8d7e.exe 47 PID 2896 wrote to memory of 2292 2896 ceaa2b8d7e.exe 47 PID 2896 wrote to memory of 2292 2896 ceaa2b8d7e.exe 47 PID 2896 wrote to memory of 2292 2896 ceaa2b8d7e.exe 47 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2292 wrote to memory of 2260 2292 firefox.exe 48 PID 2260 wrote to memory of 2560 2260 firefox.exe 49 PID 2260 wrote to memory of 2560 2260 firefox.exe 49 PID 2260 wrote to memory of 2560 2260 firefox.exe 49 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 PID 2260 wrote to memory of 2760 2260 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe"C:\Users\Admin\AppData\Local\Temp\11b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\1010975001\cfe1773f45.exe"C:\Users\Admin\AppData\Local\Temp\1010975001\cfe1773f45.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\1010976001\a71e16de5e.exe"C:\Users\Admin\AppData\Local\Temp\1010976001\a71e16de5e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\1010977001\ceaa2b8d7e.exe"C:\Users\Admin\AppData\Local\Temp\1010977001\ceaa2b8d7e.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.0.1501852598\1592534717" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce3fb3c2-fa61-4352-9092-6eb59d81d0a8} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 1296 113daf58 gpu6⤵PID:2560
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.1.1746437608\747488176" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5631f6a4-f9a1-41ab-8fed-813842bc6f65} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 1500 e74258 socket6⤵PID:2760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.2.2009548779\1292836808" -childID 1 -isForBrowser -prefsHandle 2088 -prefMapHandle 1832 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3ac3eeda-9014-40f2-9470-12be10da6bb5} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 2100 1a4c6258 tab6⤵PID:2664
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.3.1526235397\1587944671" -childID 2 -isForBrowser -prefsHandle 2812 -prefMapHandle 2808 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e7202d4-3084-4364-816e-efefe677b76a} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 2824 1ce73b58 tab6⤵PID:2704
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.4.1296549210\1812170045" -childID 3 -isForBrowser -prefsHandle 3448 -prefMapHandle 3796 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b85761b6-2b24-4fc5-9511-c924ceabda8e} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 3888 21694258 tab6⤵PID:1356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.5.1333337418\1238464302" -childID 4 -isForBrowser -prefsHandle 3996 -prefMapHandle 4000 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {46bb1a06-cbc4-4c4a-bc6d-b68d0f5446fa} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 3984 1f3ee258 tab6⤵PID:1096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2260.6.1529710294\1246113897" -childID 5 -isForBrowser -prefsHandle 4164 -prefMapHandle 4168 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 844 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {05fd92a7-19dd-4bcd-8bc7-6d4b0ebd1e82} 2260 "\\.\pipe\gecko-crash-server-pipe.2260" 4152 1f3ec758 tab6⤵PID:1784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1010978001\a91349f62c.exe"C:\Users\Admin\AppData\Local\Temp\1010978001\a91349f62c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2304
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize24KB
MD5bdc93e932b0455135d688ad2379319d0
SHA1fc9c1c6cc17642ec80295ecacdc96b79d90ddc5c
SHA256f66ea6d591ff724203bf882044230478a295026e2d472e74e6fc546132d03d65
SHA5123e0f333f18b2f8a71564c6d607ea83b63f343d74371dfb231a1adeac28906595556abbfcfcd2712a05f0a75ff3400eadaeef967f5f550b1a74c1a4cd3b10c819
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize13KB
MD5f99b4984bd93547ff4ab09d35b9ed6d5
SHA173bf4d313cb094bb6ead04460da9547106794007
SHA256402571262fd1f6dca336f822ceb0ec2a368a25dfe2f4bfa13b45c983e88b6069
SHA512cd0ed84a24d3faae94290aca1b5ef65eef4cfba8a983da9f88ee3268fc611484a72bd44ca0947c0ca8de174619debae4604e15e4b2c364e636424ba1d37e1759
-
Filesize
1.8MB
MD5e2ff87824caaba94c6bed0b1746d48f1
SHA167fd1d01fa6b387fe333deacf02a0144a17a64f0
SHA2566c6cde5698eb54588e810bb12f219580a41ca6bef1068999cbeb8aff332a2a81
SHA512ecff4d7a5b2e4c03becb24be688b22b965e70c5e4cb446468551e187d7fd34987b08ab87a80042eb40490e283400c4417d80ddd1f03bf2914f8ae249bac79630
-
Filesize
1.8MB
MD5c50eca6553b94f0c2366cc00366686a6
SHA10ac1894ceba31577e5a9a04cc3f3391e0fd25096
SHA256b9c068f75080e128cbfa2397048a3e63cddfa2d77e670a517e496ba3bdce4a7f
SHA51210699ad922cbcc598c7978aa9cafe886aa9fd2aff484ed9dd6b6481f30b165b396a1a2404a8b90c467ab69bae5640ab5a045cb6499e06b0604bb3e0154e87690
-
Filesize
900KB
MD5e30effb00fbd1b2e5848e538b26dc7b7
SHA1dcee6cf0d7d6bf7ee789db2488b190e12d9a9961
SHA2566a8e833250e86cf1e2a98ba1d6087536ca87ff0f1ad63ccbd99a175418540f49
SHA51218d5844a46c2e23b0dcbb37239aee8faa4d3302cc2d1ca708759609779d75a2089640c8d54a69cf5c1bee32e5968461c13c978a6e6cbd313c547ca2c5f3dcf7b
-
Filesize
2.6MB
MD519d056f56dfef6c39059edcb2bf44bc0
SHA1109b685f92ee99d67ef0c01079b8151d8d65cf0f
SHA2567a170725712b56c7a937681e6973931f3cba2294fa50b8d8171c0a5989a9c9f5
SHA512359fc5c350ae5c5778d1bc48c486993f1b81bd3e6ba84019bf5486e9b63e83026885774abe87a21413a28e0af454dad5ddb3f0801ba0c7e89ca4f4b1397e9df7
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
1.8MB
MD553a52f91ea488da325331b1f7152509e
SHA1731b2c54e2b49ee60c88ca02f072de81675ef54f
SHA25611b7b4488bfac352856d30537a98e38d427a11e0fc9fc52a59ecfde93ae80854
SHA5126f850a678667c1f3803f09bae526f38478df7449f799386e0d927daeacf20c4878e92843c415eed179686ddf20af752a6957e2ca67f13ae615cf475b472e7d0b
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5f93c2a56090986cbb562713f314095f4
SHA1b71405a7fa1a611ffadea8235247f587dc340d15
SHA25683b59af67dd3452855de5e237f60c036fbdcf5dbb5e0c381c9cb3c054d283c6c
SHA512d3c8a761e44ed5f547d3c798cae50574996b490cc84e71063f9f00bfdc713d25f07a9260e403bcff3fc2f91c69c88b11e26c947826953391131686b08c3cad15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\973da80f-702f-4e10-9cef-ed42f23dcc85
Filesize745B
MD5a58a5fe51528d0528acf95d5a615a314
SHA1a49559426c10cd84102484a6a6c97804cb7dfcab
SHA256ef31cacd54af5886c235eef223fbdeacb73650178b4c061fb545f19d14310892
SHA512506f76ffb08e6c40e5e60bc0a97e7dc4280e25684503bfe57c28e339341c1fc0d0e31c87dd6b9cc57c999d2a606796175a3f01c9e16f1bfe3a1256cab62ac8c3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\dc66106f-aaef-4bb6-9fef-22a043737f61
Filesize12KB
MD5eaa450a713f00f63d7d8ab69d5c38abd
SHA139895a70b32721f5bde0ddef6bec288104c95c69
SHA2562ad77ca1e6652c23a0eba39a72927e8dcf78990696baa63d7415e27f91bde630
SHA5121092a784c18d6d23c31a2b41f499ad420a85ba73f2509d01b5bb10ded3cb6f3acdc9b381c6f86f192a161ca5277519cdab3d21aa00d7f0a9d23ead809afc8b04
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD544735d245105ebd5a7141a7400fddadb
SHA1deb46c4b0cb72c0a806e21ac1422ae6d696c43ff
SHA2569391ffb2f744781a157b375510fc1b958c1e6a23e7a04035a99f65c8bee0cb65
SHA5123a31944bb972d8f5735c3a9e0ffac0ba2441464f9e7e3246560dc0b9013ffd19f70f4c69149c01e49ce8eb7f344128a28e60a9c7a5ee1e5c4a6cbcf21f4a0df9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD575bd813ff19fe75cc0c4f9c5201047f1
SHA131e013d93f9fc09eda6bdd1c4979c00833c7c1ad
SHA2563b2b3dad86d7a56297dbd20d145107d5aa33683129bb264cd05c8015ea24565c
SHA51258aa0f4708d631d4f9887085b15bfc17a6d64fd2a0a57e40322804d75330242d5cbb7ce652763404a71b7fd9b4bd29e690f941d497dfe591d27540609647cf6e