Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07/12/2024, 20:17
Static task
static1
Behavioral task
behavioral1
Sample
28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe
Resource
win7-20241023-en
General
-
Target
28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe
-
Size
3.1MB
-
MD5
886fd50dfb9b19d4a9bf5bf95d171d3a
-
SHA1
d9c9d0a9bef7cf2a5aaa12a9cda7eed6d1c27e0f
-
SHA256
28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68
-
SHA512
6eae44ba4c95880b4bff9ce9e3680b985904229901511902d962ca6b9813f50031a1945c332d5ac549a937b47b93cacb7786e007ae7b1b1b87b9f712127a00c9
-
SSDEEP
49152:N2WqCMdnSJQRENeT4Til6jEBELWaZbb7kLW3RpM+:NcCMRSJQWNeT4TiQQK3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection f1e5201818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" f1e5201818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" f1e5201818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" f1e5201818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" f1e5201818.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" f1e5201818.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 801cb4f785.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad0f4c1e5e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f1e5201818.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 801cb4f785.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad0f4c1e5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad0f4c1e5e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f1e5201818.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 801cb4f785.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f1e5201818.exe -
Executes dropped EXE 5 IoCs
pid Process 592 skotes.exe 1040 801cb4f785.exe 1788 ad0f4c1e5e.exe 2348 b61c3b7600.exe 1820 f1e5201818.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine 801cb4f785.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine ad0f4c1e5e.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine f1e5201818.exe -
Loads dropped DLL 8 IoCs
pid Process 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe 592 skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" f1e5201818.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features f1e5201818.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\801cb4f785.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013022001\\801cb4f785.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad0f4c1e5e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013023001\\ad0f4c1e5e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\b61c3b7600.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013024001\\b61c3b7600.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\f1e5201818.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013025001\\f1e5201818.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000186e7-74.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 592 skotes.exe 1040 801cb4f785.exe 1788 ad0f4c1e5e.exe 1820 f1e5201818.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 801cb4f785.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b61c3b7600.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage b61c3b7600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f1e5201818.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad0f4c1e5e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language b61c3b7600.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2624 taskkill.exe 1036 taskkill.exe 912 taskkill.exe 948 taskkill.exe 3032 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 592 skotes.exe 1040 801cb4f785.exe 1788 ad0f4c1e5e.exe 2348 b61c3b7600.exe 1820 f1e5201818.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 1820 f1e5201818.exe 1820 f1e5201818.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2624 taskkill.exe Token: SeDebugPrivilege 1036 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 948 taskkill.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 2264 firefox.exe Token: SeDebugPrivilege 2264 firefox.exe Token: SeDebugPrivilege 1820 f1e5201818.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2264 firefox.exe 2264 firefox.exe 2264 firefox.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe 2348 b61c3b7600.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 592 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 30 PID 2556 wrote to memory of 592 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 30 PID 2556 wrote to memory of 592 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 30 PID 2556 wrote to memory of 592 2556 28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe 30 PID 592 wrote to memory of 1040 592 skotes.exe 33 PID 592 wrote to memory of 1040 592 skotes.exe 33 PID 592 wrote to memory of 1040 592 skotes.exe 33 PID 592 wrote to memory of 1040 592 skotes.exe 33 PID 592 wrote to memory of 1788 592 skotes.exe 34 PID 592 wrote to memory of 1788 592 skotes.exe 34 PID 592 wrote to memory of 1788 592 skotes.exe 34 PID 592 wrote to memory of 1788 592 skotes.exe 34 PID 592 wrote to memory of 2348 592 skotes.exe 36 PID 592 wrote to memory of 2348 592 skotes.exe 36 PID 592 wrote to memory of 2348 592 skotes.exe 36 PID 592 wrote to memory of 2348 592 skotes.exe 36 PID 2348 wrote to memory of 2624 2348 b61c3b7600.exe 37 PID 2348 wrote to memory of 2624 2348 b61c3b7600.exe 37 PID 2348 wrote to memory of 2624 2348 b61c3b7600.exe 37 PID 2348 wrote to memory of 2624 2348 b61c3b7600.exe 37 PID 2348 wrote to memory of 1036 2348 b61c3b7600.exe 39 PID 2348 wrote to memory of 1036 2348 b61c3b7600.exe 39 PID 2348 wrote to memory of 1036 2348 b61c3b7600.exe 39 PID 2348 wrote to memory of 1036 2348 b61c3b7600.exe 39 PID 2348 wrote to memory of 912 2348 b61c3b7600.exe 41 PID 2348 wrote to memory of 912 2348 b61c3b7600.exe 41 PID 2348 wrote to memory of 912 2348 b61c3b7600.exe 41 PID 2348 wrote to memory of 912 2348 b61c3b7600.exe 41 PID 2348 wrote to memory of 948 2348 b61c3b7600.exe 43 PID 2348 wrote to memory of 948 2348 b61c3b7600.exe 43 PID 2348 wrote to memory of 948 2348 b61c3b7600.exe 43 PID 2348 wrote to memory of 948 2348 b61c3b7600.exe 43 PID 2348 wrote to memory of 3032 2348 b61c3b7600.exe 45 PID 2348 wrote to memory of 3032 2348 b61c3b7600.exe 45 PID 2348 wrote to memory of 3032 2348 b61c3b7600.exe 45 PID 2348 wrote to memory of 3032 2348 b61c3b7600.exe 45 PID 2348 wrote to memory of 340 2348 b61c3b7600.exe 47 PID 2348 wrote to memory of 340 2348 b61c3b7600.exe 47 PID 2348 wrote to memory of 340 2348 b61c3b7600.exe 47 PID 2348 wrote to memory of 340 2348 b61c3b7600.exe 47 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 340 wrote to memory of 2264 340 firefox.exe 48 PID 2264 wrote to memory of 2728 2264 firefox.exe 49 PID 2264 wrote to memory of 2728 2264 firefox.exe 49 PID 2264 wrote to memory of 2728 2264 firefox.exe 49 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 PID 2264 wrote to memory of 348 2264 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe"C:\Users\Admin\AppData\Local\Temp\28a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Users\Admin\AppData\Local\Temp\1013022001\801cb4f785.exe"C:\Users\Admin\AppData\Local\Temp\1013022001\801cb4f785.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\1013023001\ad0f4c1e5e.exe"C:\Users\Admin\AppData\Local\Temp\1013023001\ad0f4c1e5e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1788
-
-
C:\Users\Admin\AppData\Local\Temp\1013024001\b61c3b7600.exe"C:\Users\Admin\AppData\Local\Temp\1013024001\b61c3b7600.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.0.1264159513\2045173499" -parentBuildID 20221007134813 -prefsHandle 1232 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {27a6a90e-de8a-4798-8e33-1ed47b4ca92c} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 1340 115cf658 gpu6⤵PID:2728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.1.32070506\1005829107" -parentBuildID 20221007134813 -prefsHandle 1496 -prefMapHandle 1492 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {de4a04a7-838f-4cb7-83d3-2644155208f2} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 1524 11506358 socket6⤵PID:348
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.2.57257381\1976847273" -childID 1 -isForBrowser -prefsHandle 2100 -prefMapHandle 2096 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8187b13a-1c4f-4f84-9447-514b6b278d42} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 2112 1155e858 tab6⤵PID:2364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.3.252168153\1863426370" -childID 2 -isForBrowser -prefsHandle 2808 -prefMapHandle 2804 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {6eac12da-9024-47a1-bd6e-af79b69f2ff9} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 2820 1b78a158 tab6⤵PID:1728
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.4.2125919754\5900408" -childID 3 -isForBrowser -prefsHandle 3804 -prefMapHandle 3772 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c843f4e9-9bd6-43a4-86a1-215fca0d5f16} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 3792 2057ee58 tab6⤵PID:768
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.5.236885602\783132809" -childID 4 -isForBrowser -prefsHandle 3912 -prefMapHandle 3916 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c0ffd793-fffc-4ce2-8b04-5478e4085910} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 3836 2057e858 tab6⤵PID:912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2264.6.1696866455\1111082600" -childID 5 -isForBrowser -prefsHandle 4116 -prefMapHandle 4120 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 832 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {09d8869e-fced-400b-bbc6-9338a772ce09} 2264 "\\.\pipe\gecko-crash-server-pipe.2264" 4104 2057c758 tab6⤵PID:696
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013025001\f1e5201818.exe"C:\Users\Admin\AppData\Local\Temp\1013025001\f1e5201818.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1820
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD5953942614b342e366731034105c25228
SHA14bb48f22fb7c9b83287c27c0e936ce6221e37d16
SHA256b929bd6ab3e91f41c3f42d1f14036268a8f1b216f92c5bd0fe61f366fcd8574e
SHA512b0bb732ae42cce5d00b51aa39deed47de6f4de3c0a3865c37289d9e6103dd23f26677ebd7271d7d9f12d7f960676455cfba12a80b7b588ff76865cbf25c05553
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\z3l10m6w.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD54ac9141ca54abebc30ba2dbbd8202328
SHA10af8d99177f5a204341e92179e3df4fc7250f55b
SHA25626617312efc260714a32d2fb9f34581833a9437197f35a0ecfd091eb48518c36
SHA51211111f1dc8e17e935f138800ec358084a4ddc31475b2ea52af58c83539c48425f8831a7449e87bf9df2551930c4891db7a2f78fa0df1cf711f9268ef6922e720
-
Filesize
1.7MB
MD55d5cbdd1801035e2485e7353df38e0c3
SHA1569f6804a09e94d2413f0239c26a7e47734178a3
SHA256678b506795611f59eec55a7003e31a378679db301b5669cdf8d2c9b0826cfede
SHA51236d5081f994c44774548fcb8fa05d3461f1cc823b62fab79b949bafc3e26f457a58f278bce3fccaa79d43b92607ce61d38d687fcffa8863e273321cf493c75ea
-
Filesize
951KB
MD576c2c0bba853abfff5189ac4c5bbfa7b
SHA15e360faf571e5623ecc24bc075dd990038689fed
SHA256fdc3cce2d6bad9345ec450432e8456b645d73a5a9d1852da73444c5976f4488f
SHA512739c03ebe636c78aa7d2d4da6fe2066886dcdff63bcd644150c75e52a724ae7559dc3f1e0b5425e74f9abd3873295e6b1f3ae0b7b1777222bb0b702a0cfca6ff
-
Filesize
2.7MB
MD5fbb08fc5dee68a2eeaeb7c1d17493afd
SHA1d87a00662b3348fd21ace933f094e89ba64ad377
SHA25674d427ab9ed2d9e35230134138b929b7528054e7a1330ca4f50997746b0cd55c
SHA51239fa6630e5f50dee9ef6216c954fdf64507fe940ee3211e2a6eb0ba659036d655b14aae8f61d88049d83fe7c3eda9c629844d8a005ad96b08efbacdd7fed2176
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD58880838f9680abf820ab9d38191743ed
SHA177f87593e312c3ee1d47576e0725e09021b8d667
SHA256707390ebdf437c1fa6c041727549ac2168866249c348ddd03347194c87a2940b
SHA512a760bc4a68fe92e706f8788ad88d0f5f9e0fb5ddb7fb6c4fc38e8057d89fe59b29729730a8e39fc8a253a88799ff6bec6dc86562e060556ae3ac1ee2ada2d1b1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\58814c3c-c1a0-4cb6-ba7b-3a9af23d9c1e
Filesize745B
MD56e41b205327bc84f4b9660c60515f25e
SHA13a5fc45c2a8658b48ffad435eda2b30997c58046
SHA25661bda7249043ae2fc25ca63c455eab5b294c4fc594bb0be7b3bff94edcc20638
SHA512b079f0069d5ec78d1a5e232414787a8d56e0210292da1848ca134b9ec2eaa8c4ed24fb9995115c1a172d9c3ae266c24258b12dde07d3113bd694d57ba0d426cb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\datareporting\glean\pending_pings\84ccf5f5-39e5-4864-b1c3-59f2fb76e2c8
Filesize11KB
MD5baffd1bf4646e67dabece9b54d8f945d
SHA1eb4cab9f92ff0e1c9410decf525c84df475bdcc3
SHA256e0715c3b64955e31b2c37a0b3dea1247847b9468241632e97b6cd7603d836f16
SHA512fca59d0df20dd24252715b09225af468e4c06dcb80daa230f04f6e6b7bc46ee1ec441cf4159216b80d1da53f18b96d5b09eca9ea486a9035f8418bd869363f79
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD59a40448f40d1b93c57ede15f96cae2eb
SHA164c96972725c31accfdb23194561e040791322b8
SHA256bb716207733df92dc8efb2428dd6b7ee7f55047d9655c4a267d21e3054fab99d
SHA51241d2885db40455ea1db2ab8f4725bdb4372df49ff93f2c191f43422c930641cfa5b200910f3646caa5f5930bde98ec3fb935a1a2164a19bc41ad193e21e3d155
-
Filesize
7KB
MD5726057313ccededd4e77df6e81385243
SHA156031c3ecd9a41425dafbe9cda863c874c881c63
SHA25641df676e221e600bfee4557390f20a9a7f3df4cbc0ab448eab0c5446e55ad6fe
SHA51289a606a0c42c2d68aec3568b5a5cce1bf9169d28754c49e88312e8f8607d05cd284365a69b93d5859e9bc0c448c10bf596cf0a9c86a15d8dc62cfef2045ecc06
-
Filesize
6KB
MD5b2610e675301a1c7c30d84be65855557
SHA16d6bca025d7057d44b05c36385c7defeec224d4f
SHA256a29db183ab08993737ab98240478922b1c67e664e43ea5983279636f0feea484
SHA5125d019140b794bd2af419c3e51efe7203d3576980a120b4e52444aff74bb74fc9f5b86048668ae7cc62dd9b77c2b3f3e4905024ebd1fe638b700af34ecc64d93a
-
Filesize
6KB
MD5ce94468b72bb9dbc3bf398f2ae8b3bb1
SHA1bb3a446ec6f3a156c8fc2da4a3f7a38ce3fd8c7c
SHA2566e6ad6521bba7d6c0e844257893f7baf18fccadbbaea0e3459c8fe7402716e61
SHA512d2230d880a4e68a7ebac5c112714d1f7ae7594134c826805f9dc982bb83fe75ebe71ddf1b6057d39e8b51412e975c6bc8744b4ee0b90c806647bb29cf029dc99
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\z3l10m6w.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD55be25a0a8f29d2f2d8ef8734757e3784
SHA1ee763b7dee14d45635067776ed744d477df48a06
SHA256a667040cf826287e726e599facdcdde512d3b1575f936684972cd0340f6f8aee
SHA512b2542ee0bad0d62fb0e04a1cdada59374c3171ec350ed00426459c899ffed35e1c6ef49938521882a5677c98de8b5b4de41e395f6a026c20cdb21484d8707c92
-
Filesize
3.1MB
MD5886fd50dfb9b19d4a9bf5bf95d171d3a
SHA1d9c9d0a9bef7cf2a5aaa12a9cda7eed6d1c27e0f
SHA25628a0cc64390601b982a6af8781fd8d186e8647c1ed32d6fe2c66261777128e68
SHA5126eae44ba4c95880b4bff9ce9e3680b985904229901511902d962ca6b9813f50031a1945c332d5ac549a937b47b93cacb7786e007ae7b1b1b87b9f712127a00c9