Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
Resource
win7-20241010-en
General
-
Target
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe
-
Size
1.8MB
-
MD5
7f0a76732977427371079aac4e055a2e
-
SHA1
c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6
-
SHA256
2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc
-
SHA512
88ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05
-
SSDEEP
49152:SRom2bAxlKp9HksGRtTvd/oheTzY0/oWnWNm4jDAATj:iom2WlKppG3vt5o4D4jDj
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://ratiomun.cyou
Extracted
stealc
drum
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://ratiomun.cyou/api
Extracted
gurcu
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%82%20-%20Browser%20data%0A%E2%94%9C%E2%94%80%E2%94%80%20%F0%9F%93%82%20-%20cookies(0.25%20kb
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendMessage?chat_id=7538374929
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/getUpdates?offset=-
https://api.telegram.org/bot7733030005:AAEneIh4MdJeCVQCr4Pys9pel6q03FCPCi0/sendDocument?chat_id=7538374929&caption=%F0%9F%93%B8Screenshot%20take
Signatures
-
Amadey family
-
Gurcu family
-
Lumma family
-
MilleniumRat
MilleniumRat is a remote access trojan written in C#.
-
Milleniumrat family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" c007835371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" c007835371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" c007835371.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection c007835371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" c007835371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" c007835371.exe -
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF acf6b6fc79.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 13 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d3b67b92a5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GI59vO6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ BhD8htX.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3bd2fdfcbc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c007835371.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ acf6b6fc79.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rhnew.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cfc538f1a9.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 26 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d3b67b92a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cfc538f1a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3bd2fdfcbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3bd2fdfcbc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion acf6b6fc79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cfc538f1a9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GI59vO6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion BhD8htX.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d3b67b92a5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c007835371.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GI59vO6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c007835371.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion acf6b6fc79.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rhnew.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 4XYFk9r.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation Update.exe -
Executes dropped EXE 15 IoCs
pid Process 4764 skotes.exe 312 skotes.exe 2400 GI59vO6.exe 1960 4XYFk9r.exe 4856 BhD8htX.exe 4420 Update.exe 2808 cfc538f1a9.exe 1504 3bd2fdfcbc.exe 4172 d3b67b92a5.exe 3308 d75ea3767d.exe 3552 c007835371.exe 432 acf6b6fc79.exe 5456 rhnew.exe 5780 skotes.exe 3244 skotes.exe -
Identifies Wine through registry keys 2 TTPs 13 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine rhnew.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine GI59vO6.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine cfc538f1a9.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 3bd2fdfcbc.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine d3b67b92a5.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine acf6b6fc79.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine BhD8htX.exe Key opened \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Wine c007835371.exe -
Loads dropped DLL 2 IoCs
pid Process 1960 4XYFk9r.exe 4420 Update.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features c007835371.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" c007835371.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d75ea3767d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012126001\\d75ea3767d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c007835371.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012127001\\c007835371.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ChromeUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\GoogleChromeUpdateLog\\Update.exe" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3bd2fdfcbc.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012124001\\3bd2fdfcbc.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\d3b67b92a5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1012125001\\d3b67b92a5.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 40 raw.githubusercontent.com 41 raw.githubusercontent.com 61 raw.githubusercontent.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 38 ip-api.com 59 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023cc7-226.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 4336 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
pid Process 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 4764 skotes.exe 312 skotes.exe 2400 GI59vO6.exe 4856 BhD8htX.exe 2808 cfc538f1a9.exe 1504 3bd2fdfcbc.exe 4172 d3b67b92a5.exe 3552 c007835371.exe 432 acf6b6fc79.exe 5456 rhnew.exe 5780 skotes.exe 3244 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 3308 2400 WerFault.exe 86 2596 4856 WerFault.exe 93 5852 5456 WerFault.exe 137 6012 5456 WerFault.exe 137 -
System Location Discovery: System Language Discovery 1 TTPs 18 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d75ea3767d.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d75ea3767d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfc538f1a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bd2fdfcbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d75ea3767d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c007835371.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BhD8htX.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GI59vO6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acf6b6fc79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3b67b92a5.exe -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 Update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Update.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1852 timeout.exe -
Kills process with taskkill 5 IoCs
pid Process 4536 taskkill.exe 4320 taskkill.exe 2240 taskkill.exe 2872 taskkill.exe 4784 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1440 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 4764 skotes.exe 4764 skotes.exe 312 skotes.exe 312 skotes.exe 2400 GI59vO6.exe 2400 GI59vO6.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 1960 4XYFk9r.exe 4856 BhD8htX.exe 4856 BhD8htX.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe 2808 cfc538f1a9.exe 2808 cfc538f1a9.exe 4420 Update.exe 4420 Update.exe 4420 Update.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 1960 4XYFk9r.exe Token: SeDebugPrivilege 4336 tasklist.exe Token: SeDebugPrivilege 4420 Update.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 4784 taskkill.exe Token: SeDebugPrivilege 4536 taskkill.exe Token: SeDebugPrivilege 4320 taskkill.exe Token: SeDebugPrivilege 2240 taskkill.exe Token: SeDebugPrivilege 4300 firefox.exe Token: SeDebugPrivilege 4300 firefox.exe Token: SeDebugPrivilege 3552 c007835371.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 4300 firefox.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe 3308 d75ea3767d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4420 Update.exe 4300 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2636 wrote to memory of 4764 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 82 PID 2636 wrote to memory of 4764 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 82 PID 2636 wrote to memory of 4764 2636 2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe 82 PID 4764 wrote to memory of 2400 4764 skotes.exe 86 PID 4764 wrote to memory of 2400 4764 skotes.exe 86 PID 4764 wrote to memory of 2400 4764 skotes.exe 86 PID 4764 wrote to memory of 1960 4764 skotes.exe 92 PID 4764 wrote to memory of 1960 4764 skotes.exe 92 PID 4764 wrote to memory of 4856 4764 skotes.exe 93 PID 4764 wrote to memory of 4856 4764 skotes.exe 93 PID 4764 wrote to memory of 4856 4764 skotes.exe 93 PID 1960 wrote to memory of 3752 1960 4XYFk9r.exe 94 PID 1960 wrote to memory of 3752 1960 4XYFk9r.exe 94 PID 3752 wrote to memory of 4536 3752 cmd.exe 96 PID 3752 wrote to memory of 4536 3752 cmd.exe 96 PID 3752 wrote to memory of 4336 3752 cmd.exe 97 PID 3752 wrote to memory of 4336 3752 cmd.exe 97 PID 3752 wrote to memory of 2824 3752 cmd.exe 98 PID 3752 wrote to memory of 2824 3752 cmd.exe 98 PID 3752 wrote to memory of 1852 3752 cmd.exe 99 PID 3752 wrote to memory of 1852 3752 cmd.exe 99 PID 3752 wrote to memory of 4420 3752 cmd.exe 100 PID 3752 wrote to memory of 4420 3752 cmd.exe 100 PID 4420 wrote to memory of 5068 4420 Update.exe 101 PID 4420 wrote to memory of 5068 4420 Update.exe 101 PID 5068 wrote to memory of 1440 5068 cmd.exe 103 PID 5068 wrote to memory of 1440 5068 cmd.exe 103 PID 4764 wrote to memory of 2808 4764 skotes.exe 105 PID 4764 wrote to memory of 2808 4764 skotes.exe 105 PID 4764 wrote to memory of 2808 4764 skotes.exe 105 PID 4764 wrote to memory of 1504 4764 skotes.exe 109 PID 4764 wrote to memory of 1504 4764 skotes.exe 109 PID 4764 wrote to memory of 1504 4764 skotes.exe 109 PID 4764 wrote to memory of 4172 4764 skotes.exe 111 PID 4764 wrote to memory of 4172 4764 skotes.exe 111 PID 4764 wrote to memory of 4172 4764 skotes.exe 111 PID 4764 wrote to memory of 3308 4764 skotes.exe 112 PID 4764 wrote to memory of 3308 4764 skotes.exe 112 PID 4764 wrote to memory of 3308 4764 skotes.exe 112 PID 3308 wrote to memory of 2872 3308 d75ea3767d.exe 113 PID 3308 wrote to memory of 2872 3308 d75ea3767d.exe 113 PID 3308 wrote to memory of 2872 3308 d75ea3767d.exe 113 PID 3308 wrote to memory of 4784 3308 d75ea3767d.exe 115 PID 3308 wrote to memory of 4784 3308 d75ea3767d.exe 115 PID 3308 wrote to memory of 4784 3308 d75ea3767d.exe 115 PID 3308 wrote to memory of 4536 3308 d75ea3767d.exe 117 PID 3308 wrote to memory of 4536 3308 d75ea3767d.exe 117 PID 3308 wrote to memory of 4536 3308 d75ea3767d.exe 117 PID 3308 wrote to memory of 4320 3308 d75ea3767d.exe 119 PID 3308 wrote to memory of 4320 3308 d75ea3767d.exe 119 PID 3308 wrote to memory of 4320 3308 d75ea3767d.exe 119 PID 3308 wrote to memory of 2240 3308 d75ea3767d.exe 121 PID 3308 wrote to memory of 2240 3308 d75ea3767d.exe 121 PID 3308 wrote to memory of 2240 3308 d75ea3767d.exe 121 PID 3308 wrote to memory of 1476 3308 d75ea3767d.exe 123 PID 3308 wrote to memory of 1476 3308 d75ea3767d.exe 123 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 PID 1476 wrote to memory of 4300 1476 firefox.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe"C:\Users\Admin\AppData\Local\Temp\2a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"C:\Users\Admin\AppData\Local\Temp\1011782001\GI59vO6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2400 -s 15564⤵
- Program crash
PID:3308
-
-
-
C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"C:\Users\Admin\AppData\Local\Temp\1011944001\4XYFk9r.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpF5D9.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpF5D9.tmp.bat4⤵
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4536
-
-
C:\Windows\system32\tasklist.exeTasklist /fi "PID eq 1960"5⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4336
-
-
C:\Windows\system32\find.exefind ":"5⤵PID:2824
-
-
C:\Windows\system32\timeout.exeTimeout /T 1 /Nobreak5⤵
- Delays execution with timeout.exe
PID:1852
-
-
C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f6⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\system32\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v ChromeUpdate /t REG_SZ /d C:\Users\Admin\AppData\Roaming\GoogleChromeUpdateLog\Update.exe /f7⤵
- Adds Run key to start application
- Modifies registry key
PID:1440
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"C:\Users\Admin\AppData\Local\Temp\1012056001\BhD8htX.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4856 -s 15244⤵
- Program crash
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012123001\cfc538f1a9.exe"C:\Users\Admin\AppData\Local\Temp\1012123001\cfc538f1a9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808
-
-
C:\Users\Admin\AppData\Local\Temp\1012124001\3bd2fdfcbc.exe"C:\Users\Admin\AppData\Local\Temp\1012124001\3bd2fdfcbc.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1504
-
-
C:\Users\Admin\AppData\Local\Temp\1012125001\d3b67b92a5.exe"C:\Users\Admin\AppData\Local\Temp\1012125001\d3b67b92a5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:4172
-
-
C:\Users\Admin\AppData\Local\Temp\1012126001\d75ea3767d.exe"C:\Users\Admin\AppData\Local\Temp\1012126001\d75ea3767d.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4784
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:4300 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2000 -parentBuildID 20240401114208 -prefsHandle 1928 -prefMapHandle 1920 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a1bf7298-4e65-4bf8-a36e-c5266d7127a6} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" gpu6⤵PID:32
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2404 -prefMapHandle 2400 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {86e7bac7-2e10-44ac-84e8-b9c300dae1f7} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" socket6⤵PID:2356
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3024 -childID 1 -isForBrowser -prefsHandle 3132 -prefMapHandle 2992 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {98039f98-2ccb-4e6c-a5a0-4b7e8f6507ea} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" tab6⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4076 -childID 2 -isForBrowser -prefsHandle 4060 -prefMapHandle 4056 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6847d977-bae3-4fc9-ba43-e6e2430734af} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" tab6⤵PID:3760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4684 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4676 -prefMapHandle 4672 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {67f139ae-a1c6-4077-b52c-ba853636050f} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" utility6⤵
- Checks processor information in registry
PID:5760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5544 -childID 3 -isForBrowser -prefsHandle 5536 -prefMapHandle 5240 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {05ee325c-bdf8-4fa9-bf8e-d07f89316a4f} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" tab6⤵PID:5828
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5672 -childID 4 -isForBrowser -prefsHandle 5680 -prefMapHandle 5684 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cc777b02-14eb-4e6e-a1ac-17e3f477e762} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" tab6⤵PID:5840
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5748 -childID 5 -isForBrowser -prefsHandle 5536 -prefMapHandle 5240 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 1132 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {65fa6cc5-f65b-4b20-946c-a9be706701a1} 4300 "\\.\pipe\gecko-crash-server-pipe.4300" tab6⤵PID:5872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012127001\c007835371.exe"C:\Users\Admin\AppData\Local\Temp\1012127001\c007835371.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\1012128001\acf6b6fc79.exe"C:\Users\Admin\AppData\Local\Temp\1012128001\acf6b6fc79.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\1012129001\rhnew.exe"C:\Users\Admin\AppData\Local\Temp\1012129001\rhnew.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:5456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5456 -s 15644⤵
- Program crash
PID:5852
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5456 -s 15444⤵
- Program crash
PID:6012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:312
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2400 -ip 24001⤵PID:1900
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4856 -ip 48561⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 5456 -ip 54561⤵PID:2180
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 5456 -ip 54561⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3244
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\39DB9E847E680B765D7B04FCCE6BF5BC0225F878
Filesize13KB
MD5a71159007e2a679dd69b76686dfd64e5
SHA1e81eebebf21e40c23e1499fd9c624be88ad622f1
SHA25652c80ef46efba0a3d012082ef4cc0238675cb728eeb7b3cb8fb8e3365bdb72f4
SHA5123139b6c68aa431228d7206dc5c835185aaa6336a8c69e4614f2bd880c715348c7ef6b765f0ec8ab8ae725f4748b68979e1d75ab3741e670762a629c0055a9ed7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5d670bc772c9752ac97255c9c70b373e3
SHA12ebf6192b803a10c71544ef06f9bc0a5fc3a823b
SHA25635aebdf2cc6bb21b555817151e224226e849af2910294c04c15466db20e5628f
SHA512dfa55fcfbddeed407d81dc4dcde914ae674d6f1a30c178a0a3899c084431b023032afe740066cdcf609964790b5c8f087848ce9b52bbd7a5cac82916c7573b61
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\85mw8mk9.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD55fa72774e9d750628857a68d84275833
SHA17eebff7d14817544cc11829e354c1dfc7f603628
SHA256a170fa6fefc8b753ef0f88384b906ca2338365d8552012ed7aa1c0c8c7cb5a56
SHA5129ac2715f35e107effef9f4526e6430271ca141bc5a729993e88dfa50eb20f61b15502c54f64e9596cd9bb449a1bb25c1cc98f1d12d857afdda742cdce3280838
-
Filesize
5.6MB
MD523b25ce90f70ffa0435db8df6a6764f2
SHA172d0c052f26309704f13c090495c3cdea4ed1bf2
SHA2569165705656ffe7608922ff366357e3b98b0e5ece8c6d39780874c7b4bd7b2dd3
SHA512b6c81131119b95df9d789329ffd4553c1624f7d9e38c46924ac4838e59ccb59b538646f36d8c80b9361412842f8c0328aa4177e93e72e22c15077669ee9904ec
-
Filesize
1.7MB
MD5ff4cf493ac5f7663d1cfc243e6646eb7
SHA1ff7184eae695580f1e86fac340925c7f01f4de6d
SHA25672a99a945b705fc1c8fa59c3db6810be2aadeaecc34f954f5ab314574002d748
SHA5121eef407d5bfa8b94bb98cb0a64e7c73cb94176507fa924642c6cf21192965ba8856390214379fddf192b88e19377768ead94fb4d393831e47ca230b6b168f14b
-
Filesize
5KB
MD5dbf260ec509090920a3a04a2b175fee0
SHA15aca9e04c1cc128a523c567ef1aa75584c4c9268
SHA2562ba68aeb4e25c437a3b6405dbc9e8fe1a2a69925cd419113ca0d374014821b1a
SHA5125b53145651a8a9b02d49129c8c758eb27fd4a80a0c174c11290a8370dc73551fbc5521f91fb13065e3f4104b955b1e3641f3477c466c8ddaf043dc901b546413
-
Filesize
1.9MB
MD582d1397fb388fe6e4b7c66b0ae4bdbe4
SHA1d979b5399d577b53b63b428c4a35abd30d6cc9de
SHA256b3bab1d09ce9738f8bcf2c838086eaf628715df4fe99ef26c7c85b6e9b9a6443
SHA51247de07a2595067569a1ded7dd330f81817334d9442997cf25af977ecac04df5827d4475145cca0f8cf457002d147bed789cc2fc24d275fcff129d14a41b0531a
-
Filesize
1.8MB
MD55e384bc6b7285a6ac5237864932b36c5
SHA1e209c0aa850aa07a620a14c6414552496e867209
SHA256dc71955c6330cec834ececf0776af74c62c9e0ea6278e25d0719c781000914a6
SHA5122757a505ece762122bc28fd9763cb18c0ac375adfefc73bb22eb01c627db8b30d215064388f8acf813d36dea0fee42140f878de3085b8e3e90918e153e56e920
-
Filesize
1.8MB
MD5a8d5d653a05c2b4746988e9c1a0e5681
SHA167ff7060ba5430fb8c5da54a885f8f4eadae2ea4
SHA256f8f6069c106b01977f2a7c1d222d212d57041ae76ad1709bc7d51e2316f32110
SHA5123382733b2a70f3971b9834cc53549e0f890e04ad7ac1469b08a5bf89bfc477e79ef646ce2753c46a7c68ee63999f4d8399127cf3ea5c25b28d36d28f471e653d
-
Filesize
944KB
MD5259492d195d527bb189e7d637a276fb2
SHA151495545debde951ee59e2e6f1904084512f6611
SHA2564b8ae3b0c2394a0f4294fede9d66d6e6c833b3bae011ba301c2ed0cfb80f4107
SHA512d9b8bd327836019688e5fa97ae16731c861740449974e6dcad857fb5de8b39b9069011215e48aec86a8362c5f89706bff6bf11de77da9206c475846dc66ec99d
-
Filesize
2.7MB
MD502ca12ec4f754b8c5a6d65e96102cac7
SHA1fdf50b5fab6a4ad4a4b5dab0ed2e6b670f17cca5
SHA256514deaa8dd99468f1d8e6c750641a00b8aadf4c2171b3c1fa984ec4e2e6cd097
SHA5127cbea96a7883022a44a1ef5e14772fa7ccb1962931bd8ffd7c726e130dcca989e49ecbce844fe23be732a2c2d3cae92be53a0b0fa050651e69744a0a2aa82eae
-
Filesize
4.3MB
MD5cabe7aa4a6430daab83f5d7f37aca904
SHA10c8d8e4b20c857c52231b4325e808a3d90c73505
SHA25603fe3055e0b12aa4a2186a0a89ea58dfdf6a071679ba3950202204b3e62e7c8d
SHA512fae4b2dae145c35e0bdec6c3977186d1356f6065413b364d2f373cef5367da6bc6b7a2b31154df5ad5c0608fa3d165595115187297fbe88d621c51fbd5628159
-
Filesize
1.8MB
MD5a84456172908e096d0ac6272b9503e08
SHA18b64d38bae9fc390e621323e9e91eb8f7def421c
SHA2564f95dff270ac4172d470789c3fce9ae2c656565a3887afc86507ec49981bd128
SHA5123237f19915957327d3debd46de1c52531622fba5dbb2e06c9685ca336bd4febf19c2f3dd533c5046b0e676d21f10ba10478b3bbe9dbb31823b7dc118a6413800
-
Filesize
1.7MB
MD565ccd6ecb99899083d43f7c24eb8f869
SHA127037a9470cc5ed177c0b6688495f3a51996a023
SHA256aba67c7e6c01856838b8bc6b0ba95e864e1fdcb3750aa7cdc1bc73511cea6fe4
SHA512533900861fe36cf78b614d6a7ce741ff1172b41cbd5644b4a9542e6ca42702e6fbfb12f0fbaae8f5992320870a15e90b4f7bf180705fc9839db433413860be6d
-
Filesize
1.8MB
MD57f0a76732977427371079aac4e055a2e
SHA1c799adbb85ecde3ed6c2cb17c77ee989d73cc9d6
SHA2562a0efd42c22af406d984461f1226c56f65fb74a9245d5397f94cef43aedce0bc
SHA51288ed5cac47d9765cde1e83e489e4f7707176fb167318343e8c58611d4fd315de77125866d79a63ef5400f8a0b51048a0ce77298874bf1b62c3bc34f110761b05
-
Filesize
286B
MD53ad8d6d2e36b06a3383e9a5f40d17060
SHA11f4a19db17def1107ede5fd15108749a76e32eb4
SHA256fc844270c9d78b5e509f7042df1123be062b2d34069b95271610e53bbe1cda6f
SHA512077f4733b4c8f598b5b057560892d7f640b3338e52a3f547c0437d3942091d6df52390f56a2bbad684bef0371908de2c95e2b43625ab8fa5b750fdc3dcf5733d
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize18KB
MD53804429eaace39037afebd93e648dc13
SHA196ac7c9ec82acdb506b136e4d8f6f74435254d16
SHA2563c679a638b08c5b4f68c86b616ccdff85775a55f79a8105e1e08505d62280d25
SHA51293386c221b576c1225c99996bbe05b53259bb7ccd53e2acee6c7778a97c13f4ea432d1ab6e3a12f64969ff6f0e8b20a7bd3a12961f253d93c4700bb4343f5595
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\AlternateServices.bin
Filesize8KB
MD579643e8a56e6822150b9354590cb28c5
SHA1588ef75369caaa3cb1a19cdc9cf15382e7fdc9a0
SHA256c0af4b3b6d9de61dd921b9b63bfeaae6671318bd0c24b62466d3fe45570f893e
SHA512ddd865df08a4977f55f0fccb9cf9123c200d8d798d64ef50b2bb7db96d621366c755e2a46a6ba2af389a50e99dec3a91ae6a71d97629e2b2ced739db83d5c96f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD57351defa0bb8f79957fff1f43155fc2f
SHA19d12417e3a4d0ef1ecc6dfb98f1cf9146f558339
SHA2565e48015d8d3fc4c14a20cd624c01f2a0275dc7aba0e8e074b3ce34945fab8f3d
SHA5120b960cc8d7f0973c169210c99fbe37b7897c78d30052ba9169d953688fad69cb46c1eebf3eb2b85b470a5f2667a3554b29c593dac0013c41bc5d9b91f6a2d43a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD582a60808ae08fd116a337bb0226bc3aa
SHA1182851b51e168f5d925a137facdd9ca498ee1cd2
SHA2561008e60db1ddb727ee21b14b89a238cd1e9fc9bf0e5b6b173e98376892b9f819
SHA512af42e2a6e7e1130be7d668841391d01dd46878790555eefbfbdf0121a0cddf1bb0f513949e286fc47fa3f0ad00a06b635e9df41560d0309820a834e98762bb06
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD543452f3759e807fe761af47bc8b63e4e
SHA15855ea961c002ca34d38d8922cac60689edd303e
SHA25658d290f4eb7397893c08bfc4b8cddd3c576fd13feb5d9f8670fb7cea9b3dd307
SHA51211fc92b0a17371a3cb976a30e7ee84c34de0ff66aae37268259bcad8a9c65cbb1df5c228b0ab1cb7fc0577312913486d7196c37e8a027c60dfc2ac7d35e0df93
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\69c9b730-f6ee-4183-80bb-8b1e09a6e8ad
Filesize671B
MD570bd04474bedca52b875ba3c49c63f27
SHA17a068083a1e2d26f080478ed81165f56da221ba8
SHA256109eda8c04ad48fb3a864edab62f8af01280fa4ea2ff22e9946d9e7ff432c768
SHA512699478b12e37fcea723b897a539a1f27be8a98b47e19efcdbb2dc6e9e7dd024e50f2d2f293ef0303a24b8ce1dc59cda1f6743f91b9ed36e94eef3ce3fb7fbd38
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\d2c5814f-e968-4648-b14a-9f643dd4c7a9
Filesize24KB
MD5d33f6eaa4cf2ad41b1d79e478658125c
SHA155f52a2547f55ba26c5ff82a16c6120da23be023
SHA256ca0ebcbf014b1c74c2dbbcab6216fa0aa99000b68bf5ad739d4c30e1fa7a7144
SHA512b114f5453532f551ffdd9c74d71213cbcb9324b9a9b1428720b30d6ac1554284b13e45f567a52fef3ba5135115036fcf4e2fe9d489116d3e97c896bff41d6340
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\datareporting\glean\pending_pings\f7d4490f-645e-4a85-aa89-8badd0bde7b3
Filesize982B
MD536bc9b40cc6f7af8cbb5195f3439e3d8
SHA147746f5ee898c1a088e1e1dfba36c564944c5c03
SHA2564548c268fbf954b4db9aca65cbba27cf6f595f180444ae250919fd1e485f1d26
SHA5126578367c0480e6542b55178795209e012b2bc778a5a056b6035e0afc189953843e74f39f23b26b9f87e6364c033b424a38a354b3e57d322ecb6ab5b921e252ae
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\85mw8mk9.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD510dd115fa19eab9655abfd9069fb7384
SHA1cc8c7dd437d0d9e917be6d0cc7ec94122b348f7f
SHA2566f18ddec2e22d613ef5cf00bc6e83cb1e6086fb4886a3a55fcfd714655741f06
SHA5127b8390cab368854b7ceb7d6d735d692be8356727a567eacc1a437c6a260edb68de23764cd363258e7f75080a6860dbb4e00fd54fc475e245b66a7f57758590e7
-
Filesize
12KB
MD552937e05aa9032788c8110a3b5bcda26
SHA1b7229f2cabc1393b50f6c73952cbf64e9708e370
SHA25608590730ed312fb7c9a1bd7dd43c4fd639126ea37c57b962108eb3ebe7d26909
SHA512ddda1892c0dd2006140f016a43dc3fe7a12f69363011591b6bb8e355dcfed8ea18685e005fe0570e2dba1d34db4bc0012a998a2272c8c6d20b2f0d138fd1dff7
-
Filesize
15KB
MD590a7ed69e034dcd75e274a652873b44e
SHA187ddabaababdde4ac8a5658b5ba8342db7d51af7
SHA2561c9041be952a576d737dc9f3a2fdf13713735b1695cf0639337bf87927f7be25
SHA512837ee51c923a27532ff3df93f5c40b8e305be67a9b11475b8242188b78d49c85458c8b503c913bbc5056d8c72258cb490bee9f6f431a8c1f1bcc75a4c29cf704
-
Filesize
11KB
MD592d6649fa8312412b8ae05f7398a3b4a
SHA1ed0a54121eaa7ede59d500e314758de20379e7c4
SHA256fdb0f64ec2463b53bbf4a3186e30efdbd6ff5288d164342b39ba76661db73901
SHA512c2745bcf3933c3a4b7321bb5429be6f6c0e833d7bb7a515a3fd1be9d241b3fa09fe81005747c20107dfbba799d518e666d9e654b6ade67a918c988652982ea44