Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/12/2024, 02:42
Static task
static1
Behavioral task
behavioral1
Sample
b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe
Resource
win7-20240903-en
General
-
Target
b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe
-
Size
1.8MB
-
MD5
a541fa0eaf66c44faab3dbfd8229bb17
-
SHA1
dd170660003d092e778e448d3f8fb6a6e7840262
-
SHA256
b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a
-
SHA512
c3f27bba03085836dde8f028db873052f61fb53ee74abea0f6a108399d400afddc144053975cde5a402f45d3a0d293dd9ec53b8994b7a97626b5cf8cd9c2a879
-
SSDEEP
49152:UTB6KzbULmqL+SfMMq7DQN9GwPasbxUrxdC51Me/:UTcBKOJPhbSy51Mq
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 1d9695bc2f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 1d9695bc2f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 1d9695bc2f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 1d9695bc2f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 1d9695bc2f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 1d9695bc2f.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF e7337c29e2.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 426c7eff5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e7337c29e2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 295f6dbb4f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aed9dcfaee.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d9695bc2f.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d9695bc2f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 426c7eff5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e7337c29e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e7337c29e2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 295f6dbb4f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 295f6dbb4f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aed9dcfaee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 426c7eff5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aed9dcfaee.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d9695bc2f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 10 IoCs
pid Process 924 skotes.exe 3348 426c7eff5e.exe 4292 PhafoQj.exe 6060 e7337c29e2.exe 6304 295f6dbb4f.exe 7088 skotes.exe 6864 aed9dcfaee.exe 6476 732e205fed.exe 4276 1d9695bc2f.exe 6008 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 426c7eff5e.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine e7337c29e2.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 295f6dbb4f.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine aed9dcfaee.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1d9695bc2f.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 1d9695bc2f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 1d9695bc2f.exe -
Accesses Microsoft Outlook profiles 1 TTPs 42 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\18.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\17.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\16.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\19.0\Outlook\Profiles\Outlook PhafoQj.exe Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\1d9695bc2f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011142001\\1d9695bc2f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\295f6dbb4f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011139001\\295f6dbb4f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aed9dcfaee.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011140001\\aed9dcfaee.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\732e205fed.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1011141001\\732e205fed.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c8b-8410.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 924 skotes.exe 3348 426c7eff5e.exe 6060 e7337c29e2.exe 6304 295f6dbb4f.exe 7088 skotes.exe 6864 aed9dcfaee.exe 4276 1d9695bc2f.exe 6008 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 5156 6304 WerFault.exe 98 6956 6304 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 426c7eff5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PhafoQj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aed9dcfaee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d9695bc2f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295f6dbb4f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e7337c29e2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 732e205fed.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 732e205fed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 732e205fed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4892 taskkill.exe 1828 taskkill.exe 6736 taskkill.exe 4360 taskkill.exe 5500 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 924 skotes.exe 924 skotes.exe 3348 426c7eff5e.exe 3348 426c7eff5e.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6060 e7337c29e2.exe 6304 295f6dbb4f.exe 6304 295f6dbb4f.exe 7088 skotes.exe 7088 skotes.exe 6864 aed9dcfaee.exe 6864 aed9dcfaee.exe 6476 732e205fed.exe 6476 732e205fed.exe 4276 1d9695bc2f.exe 4276 1d9695bc2f.exe 6476 732e205fed.exe 6476 732e205fed.exe 4276 1d9695bc2f.exe 4276 1d9695bc2f.exe 4276 1d9695bc2f.exe 6008 skotes.exe 6008 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 4292 PhafoQj.exe Token: SeDebugPrivilege 4292 PhafoQj.exe Token: SeDebugPrivilege 4892 taskkill.exe Token: SeDebugPrivilege 1828 taskkill.exe Token: SeDebugPrivilege 6736 taskkill.exe Token: SeDebugPrivilege 4360 taskkill.exe Token: SeDebugPrivilege 5500 taskkill.exe Token: SeDebugPrivilege 5656 firefox.exe Token: SeDebugPrivilege 5656 firefox.exe Token: SeDebugPrivilege 4276 1d9695bc2f.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 5656 firefox.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe 6476 732e205fed.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5656 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 392 wrote to memory of 924 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 83 PID 392 wrote to memory of 924 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 83 PID 392 wrote to memory of 924 392 b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe 83 PID 924 wrote to memory of 3348 924 skotes.exe 85 PID 924 wrote to memory of 3348 924 skotes.exe 85 PID 924 wrote to memory of 3348 924 skotes.exe 85 PID 924 wrote to memory of 4292 924 skotes.exe 89 PID 924 wrote to memory of 4292 924 skotes.exe 89 PID 924 wrote to memory of 4292 924 skotes.exe 89 PID 924 wrote to memory of 6060 924 skotes.exe 95 PID 924 wrote to memory of 6060 924 skotes.exe 95 PID 924 wrote to memory of 6060 924 skotes.exe 95 PID 924 wrote to memory of 6304 924 skotes.exe 98 PID 924 wrote to memory of 6304 924 skotes.exe 98 PID 924 wrote to memory of 6304 924 skotes.exe 98 PID 924 wrote to memory of 6864 924 skotes.exe 102 PID 924 wrote to memory of 6864 924 skotes.exe 102 PID 924 wrote to memory of 6864 924 skotes.exe 102 PID 924 wrote to memory of 6476 924 skotes.exe 111 PID 924 wrote to memory of 6476 924 skotes.exe 111 PID 924 wrote to memory of 6476 924 skotes.exe 111 PID 6476 wrote to memory of 4892 6476 732e205fed.exe 113 PID 6476 wrote to memory of 4892 6476 732e205fed.exe 113 PID 6476 wrote to memory of 4892 6476 732e205fed.exe 113 PID 6476 wrote to memory of 1828 6476 732e205fed.exe 115 PID 6476 wrote to memory of 1828 6476 732e205fed.exe 115 PID 6476 wrote to memory of 1828 6476 732e205fed.exe 115 PID 6476 wrote to memory of 6736 6476 732e205fed.exe 117 PID 6476 wrote to memory of 6736 6476 732e205fed.exe 117 PID 6476 wrote to memory of 6736 6476 732e205fed.exe 117 PID 6476 wrote to memory of 4360 6476 732e205fed.exe 119 PID 6476 wrote to memory of 4360 6476 732e205fed.exe 119 PID 6476 wrote to memory of 4360 6476 732e205fed.exe 119 PID 6476 wrote to memory of 5500 6476 732e205fed.exe 121 PID 6476 wrote to memory of 5500 6476 732e205fed.exe 121 PID 6476 wrote to memory of 5500 6476 732e205fed.exe 121 PID 6476 wrote to memory of 4204 6476 732e205fed.exe 123 PID 6476 wrote to memory of 4204 6476 732e205fed.exe 123 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 4204 wrote to memory of 5656 4204 firefox.exe 124 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 PID 5656 wrote to memory of 5988 5656 firefox.exe 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
outlook_office_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Office\20.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe -
outlook_win_path 1 IoCs
description ioc Process Key queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 PhafoQj.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe"C:\Users\Admin\AppData\Local\Temp\b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\1011136001\426c7eff5e.exe"C:\Users\Admin\AppData\Local\Temp\1011136001\426c7eff5e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"C:\Users\Admin\AppData\Local\Temp\1011137001\PhafoQj.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\1011138001\e7337c29e2.exe"C:\Users\Admin\AppData\Local\Temp\1011138001\e7337c29e2.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6060
-
-
C:\Users\Admin\AppData\Local\Temp\1011139001\295f6dbb4f.exe"C:\Users\Admin\AppData\Local\Temp\1011139001\295f6dbb4f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6304 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6304 -s 15564⤵
- Program crash
PID:5156
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 6304 -s 15644⤵
- Program crash
PID:6956
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011140001\aed9dcfaee.exe"C:\Users\Admin\AppData\Local\Temp\1011140001\aed9dcfaee.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6864
-
-
C:\Users\Admin\AppData\Local\Temp\1011141001\732e205fed.exe"C:\Users\Admin\AppData\Local\Temp\1011141001\732e205fed.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:6476 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5500
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5656 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1988 -parentBuildID 20240401114208 -prefsHandle 1916 -prefMapHandle 1908 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {497463e3-96cf-4f3e-8339-e26c2409392c} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" gpu6⤵PID:5988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2412 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {76da9c16-c15c-44ee-96a3-d30de51e0033} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" socket6⤵PID:752
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3068 -childID 1 -isForBrowser -prefsHandle 3076 -prefMapHandle 3140 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {af08b3d7-614d-4c11-8125-3f81ac08f3b4} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" tab6⤵PID:7032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3896 -childID 2 -isForBrowser -prefsHandle 3892 -prefMapHandle 3188 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {f45c239d-9261-4b6b-93f0-90d9c5e7e6e1} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" tab6⤵PID:4052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4724 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4736 -prefMapHandle 4732 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e026005-b164-4308-b0bd-5ca3c3b195b4} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" utility6⤵
- Checks processor information in registry
PID:7052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5608 -childID 3 -isForBrowser -prefsHandle 4952 -prefMapHandle 5592 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {25e968a9-79e3-4a5c-9a6b-34a86c248c0f} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" tab6⤵PID:5204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5796 -childID 4 -isForBrowser -prefsHandle 5716 -prefMapHandle 5720 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {bf8e0fe7-a1a9-4443-92d3-ddf14a21ac56} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" tab6⤵PID:1600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5896 -childID 5 -isForBrowser -prefsHandle 5900 -prefMapHandle 4644 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1228 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4851a434-8d54-4ddf-9a12-7f9547b2c52a} 5656 "\\.\pipe\gecko-crash-server-pipe.5656" tab6⤵PID:5592
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011142001\1d9695bc2f.exe"C:\Users\Admin\AppData\Local\Temp\1011142001\1d9695bc2f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4276
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:7088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 6304 -ip 63041⤵PID:2936
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 6304 -ip 63041⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
1Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5d5bfc6f7b26494ab512dbd8739f16fa1
SHA10fdadeee1db1a513a790bc2822e1ff15385be4fc
SHA256ebd874a89101f96d4fa76e0997b7dd17c1f4bbbd7037051e8236145b4f65c19a
SHA51210d9f12a5347d4bbda4a8c486146cff32bf6bdc5a8194d9df314309e072067f67e5959fd5b4c6791fe367da92be333e315080ed5d6dcc53e3ef6514d4a29bbc6
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD544925726214b7fb9169a5cbb13255281
SHA15f0963089c30388439174e3cc5e34650b5391d58
SHA2567f10ef43ba2a831ccb5c840c8cabc97140e6f7981052d4a072c5ba63ce536471
SHA51278d3bd13955fb6dca668367b0d35e1f025901b28503a82a9d15a4a2834b65afffc15d6e04f470d74aea2901b456455075491f991c17845acd2d2351fc05ae960
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\42vejdix.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD51c939c7afa06eed5c2c0d981e34aa6fc
SHA1a9146fd4ac4bb7bf5637841dc0f4b911a69165ad
SHA25607fe147e55bec3004761032f53e458937ac1f9ef5724d5519c205c620928bb4d
SHA5122a5a4a1aa738a49198a6495a2dfa58fe998ff3c4d4d3b016b97dc2cd6af27a5e74c6aad839a5e02c2689910566f875e6b6f6deaf7a16cedd76c0fa5127e85c33
-
Filesize
1.9MB
MD5870c92cf89253baeaf80574aaad15adc
SHA1feefb55fa434ceb4aa10997bedfccd5597852078
SHA25665238eee07b00d608d030a601ebe0878656466084e1f55e9e41258bec1370b59
SHA512fe1cf7efa897c4c4fada01ba67ef38e7491d96870ab32354b0acbf2bb0cfa32faf914d05037d6e813fcc9b1241466acdaa178adeacc2451ea371f1189e7923c6
-
Filesize
1.4MB
MD503757138d540ad9e87a345bf3b63aebf
SHA183a0b3ce46a7178456763e5356bf4940efa41cd1
SHA256659ef7c3fd01df95231975c36e8e45444f6329da33a70e58690f2ee75c7a722f
SHA5120f08c40ff45829c608a42a6d0d12c1b2a726d315c28f0b4330320a7585506474f72eca550a90b042eece41911174859e95d4b5056c77999a1acf14d43e5279ca
-
Filesize
4.2MB
MD5bd6d6662b11f947d8480c6e9815c3ef3
SHA1b5ecc2be2f54b7849b8c948bbd91cef25028ce41
SHA2567191093754402a6cc5ee460bafef859de07ac2bbf91ce56c6b56a91d3020c2e2
SHA512242a995d3c3a123401d7776b1b5b373d7d117566a897e3e8ed2fe07faaff3dfda01daca76cc60012a6480412f6118b5185926677bb61678bdb3cca336a36e8fa
-
Filesize
1.8MB
MD52426e5ac8ee0bbb03e63d7467cba1df2
SHA16cfd84d6f98b4a9d1b9d5bd724ec59cd4e8533c3
SHA2564b6f652aa6df9d8078f869655c18ac854262d94c3b3a547488a2ece1b184a7b5
SHA5125697de737cf9ee10433c57a1f0d214b0d8344ad33306b243624542ead2375e6c3a4ca5a8d4e3b806cb5bbad17b1612881b1f1064d03b18da01c5f96c57e9751c
-
Filesize
1.7MB
MD566bcb6e17b5fb8da5c8791b5fd6cadec
SHA1a7ef8cd29018bce43618425c1f211ab4d7d3c88e
SHA256cc9109ffeede3b8f3117ccb1bae82347c4506e08e2a06c3bffd15608dad16cfd
SHA51276708812f23247c7ab921adb69f1fe3c79e3bef5f2fd374021ab120644a7c4e9768b202c3283edcfb9b7b42647e86f880021eb340594b0cbc0b07938408a8aed
-
Filesize
947KB
MD54932e7c10bb027cec9de8696ecf6901d
SHA1aef2197b802633e3453dd7c221bbd889b99a5b90
SHA2566bbbe9d1fa289f9bcdfa962f16c09f8035064becce76871a60c9db490bc6df9c
SHA5129253a415c4f826b09ab01f2afb7f0b2c35534aa093209e72223ab23392822b50d3edc1949c66d1f39aa59198e9275a1b7729df6a9fb39008e9bb28c6f245c8b3
-
Filesize
2.7MB
MD53834ead0f530e99a0d9810e6866e893a
SHA1a051a6bc8dcd18dcc71af7861c8031f0bfade6c1
SHA256c7c57fb214ae177ef2cf143775c2131cbdcd8965bf55540a3422ebd03494d436
SHA512e2e0b2907f28016ec5a22976dd211a73d0ee9aeee1859740e31ca073a17a79f4624415a216939f80b4746e731b98c1066c5e854307950d8c73c4dfc67854b24c
-
Filesize
1.8MB
MD5a541fa0eaf66c44faab3dbfd8229bb17
SHA1dd170660003d092e778e448d3f8fb6a6e7840262
SHA256b66b9bbe43d16ba2ae2275aaad148809d9c5bce9726ac3f4b57333d355f9a85a
SHA512c3f27bba03085836dde8f028db873052f61fb53ee74abea0f6a108399d400afddc144053975cde5a402f45d3a0d293dd9ec53b8994b7a97626b5cf8cd9c2a879
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize6KB
MD551b2423ddd6051b8ff4b5d7943b5bf53
SHA1d5072b495cd7476194ae4b757f753213f1156ab6
SHA25601e5e7e7e643954dbe592f7555470d61ba8dbbbb83e99ee359cae20dab3f081a
SHA5122da66a5b30c1966f40380ad738f303abedd40f726b6f70a11bfca37803589958df4898ec81bd3c186cdcb518bd9866726a8a0288e522169b0031409f14c6144b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\AlternateServices.bin
Filesize10KB
MD5362c8243a9ec0f028c58f70c09022e89
SHA182bb863095d1f4f49cb11f22c31d2073788acb78
SHA25614f0c9bf5b7012edf06fd33a3dbf6e951c0e5b1eea3b2d1fba2c5d1fde019939
SHA5128ec667cb134dd31f47d270f56677efe7cb4050152d2c65bcf85f513f475f999a2f187b04cade27d3592f4a3f558a671efd7bedfcea7e082975b99d88ac267256
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD550ec6d792f62233cc42caa1a4acda832
SHA116ca8a9186285f5ac10d97747a10021377acc61e
SHA2563c9377b7ad6f5f8800fe588ec63334d7d0900259a187e8f89fd8469dd8ff95ae
SHA512005f67c67c79d5f0599d523ab241c7a52e66ac9ea47d08b8257abbf50f8441dcff1a1b5a7ba2d5e9236629d32918d7cd8d7584ca5d3f91172d9e0376a1ac65a2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD5aa7bfc5e6164c48e57a1fab8e8fab7d2
SHA1d32e1a903a87400a87df7b947cdde5bc29c38d79
SHA256c9d70beb9e8e8d692c244d3cbabd81ad2fa572663eac063d3b71621bb0eccaa0
SHA512ed59c410e8af4b66276e0adeee919bdab7493d5a2f0311b6ad39272f842c52f4b2794a3cf6690981fdfffce163645505751f5f0ab49649b08bc757c3869c96ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5ad2f4e49a8071fb93e1460bbae8ba8d7
SHA13b66c1dff23ca413cdbc19ea3a8e7f8050cfecec
SHA256fd44d3682e4d477164c1a20d07871c19ba2bfd4e5aaafb4936db3d5ece1a1160
SHA512fd30d63e99548f66970f82312b9da23689c1b1d64ea8db05fa262c5aed421f8fcf9335105c946febaf96e9732eedd593e614f392a5443344f16ddc1c710b479e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD56e4e296e844b2d2785c9cfadfbdfcac1
SHA17e4f626e495d0c00fe57afffc094f6b0248df6a1
SHA2560b77577b038dae22b8d7b1316923df70ce18fff65e2115ddc75f7d2ca37df856
SHA5123df49880210e4ba9acd727d512b3204ca15ffab10ec9db24a4baeb2be9d7c886cea18cdbad68e48083ac3d624e79f09ebb20c3579a30a82c894be72731f66061
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5ad8812478c16b5ba7bd78e32889783e0
SHA183b6697dbefd585e89a05a8595ecef1af0ad9c4b
SHA256093805aadfbf638361291637a4530709cb90ebbd4b948b381441f8d67a5fbb6c
SHA512b7a008bafb67945b29d177fb623d62d832b6027f24e34c5de071abcf80afa25a633baa0455b13e5047b3d7750a790d07cc74987be9b2f7e12c396c93d7ee8b2d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\26c8e286-3d59-4a88-89dc-78264f6b40bf
Filesize982B
MD5d8031ff74f4ae3b71a79e82c745b0cd7
SHA1d247e4e393a2d83780b469effef4f5702e1f0b2f
SHA2566c8b6f3f1f09821694bf83f967e11495d820044e6646f0e0dbf2dde40def0da0
SHA512dac04a27111cc807491b00b861d2ad5ac7e2c55b29af9feb4ed646752a9cade163c3efca50b4ee5812c6ceec8de7ac403baa1e28b2aadb4ea3b6b35561a13e88
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\datareporting\glean\pending_pings\7bea1605-6688-4a51-bee7-d8773b409ede
Filesize659B
MD52abea1aeaacdf96bdef6b904e4831659
SHA191031a6b4eaa025310072d8a2b781f48e70a33d5
SHA256fb6a7731380d8aa131271b4c772eba8e6cc7bdfa869af581f9f5a620720c27fe
SHA51292357b57ddd6970316e05171ab452467cd862cc53204199259dcbdffc33c8181c5de6a7988bfff7a224d9c4ce7cb873ec6a76dae0a41ee0954a09e461775939e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\42vejdix.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD59804c045003f84a426dd0e7396ea92b5
SHA10455837c42e8399703cc562d01ec6c5a2f6b2c97
SHA2566df27430ecb88a9eb756a3fb8a18d0ec66a83919e7a69a6c5afeb5f948a6662f
SHA512deb64e23674761b9d7f3a7e5acd75d5d7c335f16ce244543fee16fd68a639f574e4450dcbfaa029276684780be903fad0c0f4ab308e443ab54030da50f7510c0
-
Filesize
10KB
MD50867f0a646adb401161556c2ce809bde
SHA1d14f5aaafcd247ee4b312dc7771c56d93a10804d
SHA2560c8eef71f9d4a4281d2688f15c098d1b75d8ee958c2da2dfbec506d19c81014b
SHA512f14f6ef513e241b31184dc6a43e378a63413d378e75f5c7adf6293109192289ddcacd943cae055521e496e6bc5b42f12e58de36fd0787c8a6ed4d75cecf5398f
-
Filesize
15KB
MD543763757972ddff71a7c778c78253059
SHA1b4a5ac1d96498ec5efc52db73962a703beccfc91
SHA256a69bdf20ac3aa0add0f7a61b6b5e3dabcd9bf28ffb9d3b3e6456d7d5f93f244a
SHA51206a807c98d224e58f49893118f0ccf9f97b4890ffc2d63ce6b1f1fd3556fa8e43e8758e06f51181ba506b3b88a9e7ba9c4559ab6bca67839445afe5bdb9bb969
-
Filesize
10KB
MD51a14666914cecde649937a55230ed59e
SHA15dc1906ccd7f2b2abd21e3d243a72e5b5e295060
SHA2565eb1a5cb2e0620416ec71d90bfaebfa27aaf0cc20680cba51b54e6ba7ab7d9c2
SHA51222a3db57032b969004d2d2764c3ed4ea2948a5183b304a5a6a50c51958d09d23dcb18e1abf0bfd94c917cbf7b9aa1c7184943ccc7f174b85682a37147b8968fd