Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 19:50
Static task
static1
Behavioral task
behavioral1
Sample
8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe
Resource
win7-20241010-en
General
-
Target
8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe
-
Size
3.1MB
-
MD5
2ac272fb2ffce59ba9a41c321a1ca05b
-
SHA1
b96d37991e9443f22e3f49196e5059093fe18c23
-
SHA256
8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec
-
SHA512
31d9ad1a6f88218ce56e5a0cea77eee364091f72fd3e5a2e96c7ce300bbec3b98c2440bc40b52740614a229ab71903e7222d3d6f905c73f56396545ce18df42d
-
SSDEEP
49152:XGqnrH5AgOUIYV3hIuasD65jgJCP2tOcb84c2:2QrrBIg3hQsO500c
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
https://infect-crackle.cyou/api
Extracted
amadey
5.04
397a17
http://89.110.69.103
http://94.156.177.33
-
install_dir
0efeaab28d
-
install_file
Gxtuum.exe
-
strings_key
6dea7a0890c1d404d1b67c90aea6ece4
-
url_paths
/Lv2D7fGdopb/index.php
/b9kdj3s3C0/index.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
https://infect-crackle.cyou/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 8d325f4a56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 8d325f4a56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 8d325f4a56.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 8d325f4a56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 8d325f4a56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 8d325f4a56.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7qg0CPF.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3e1c6c9d12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b9ce53d685.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8d325f4a56.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b9ce53d685.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3e1c6c9d12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8d325f4a56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8d325f4a56.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3e1c6c9d12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b9ce53d685.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 7qg0CPF.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation word.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation word.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe -
Executes dropped EXE 14 IoCs
pid Process 3092 skotes.exe 3976 qtmPs7h.exe 1084 7qg0CPF.exe 2072 3e1c6c9d12.exe 1520 b9ce53d685.exe 2104 14cb490bf6.exe 2296 word.exe 3336 8d325f4a56.exe 5520 skotes.exe 4132 word.exe 5664 word.exe 2988 vector.exe 5772 skotes.exe 1544 vector.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine b9ce53d685.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 8d325f4a56.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 7qg0CPF.exe Key opened \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Software\Wine 3e1c6c9d12.exe -
Loads dropped DLL 1 IoCs
pid Process 1084 7qg0CPF.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 8d325f4a56.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 8d325f4a56.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\3e1c6c9d12.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013018001\\3e1c6c9d12.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b9ce53d685.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013019001\\b9ce53d685.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\14cb490bf6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013020001\\14cb490bf6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8d325f4a56.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013021001\\8d325f4a56.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\word = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\word.exe" reg.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 19 raw.githubusercontent.com 20 raw.githubusercontent.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 24 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cbb-179.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3672 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe 3092 skotes.exe 1084 7qg0CPF.exe 2072 3e1c6c9d12.exe 1520 b9ce53d685.exe 3336 8d325f4a56.exe 5520 skotes.exe 5772 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2296 set thread context of 5308 2296 word.exe 147 PID 2988 set thread context of 1544 2988 vector.exe 154 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 2276 2072 WerFault.exe 106 2012 2072 WerFault.exe 106 5448 1544 WerFault.exe 154 5608 1544 WerFault.exe 154 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8d325f4a56.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9ce53d685.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 14cb490bf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language word.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language qtmPs7h.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7qg0CPF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e1c6c9d12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 14cb490bf6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vector.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 14cb490bf6.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 5 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1852 cmd.exe 224 PING.EXE 4880 cmd.exe 3660 PING.EXE 2680 PING.EXE -
Checks processor information in registry 2 TTPs 10 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\Description\System\CentralProcessor\0 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 7qg0CPF.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 852 taskkill.exe 1996 taskkill.exe 3696 taskkill.exe 2308 taskkill.exe 2912 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings firefox.exe -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 2680 PING.EXE 224 PING.EXE 3660 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3672 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe 3672 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe 3092 skotes.exe 3092 skotes.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 3976 qtmPs7h.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 1084 7qg0CPF.exe 2072 3e1c6c9d12.exe 2072 3e1c6c9d12.exe 1520 b9ce53d685.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 3976 qtmPs7h.exe Token: SeDebugPrivilege 1084 7qg0CPF.exe Token: SeDebugPrivilege 3696 taskkill.exe Token: SeDebugPrivilege 2308 taskkill.exe Token: SeDebugPrivilege 2912 taskkill.exe Token: SeDebugPrivilege 852 taskkill.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 700 firefox.exe Token: SeDebugPrivilege 700 firefox.exe Token: SeDebugPrivilege 2296 word.exe Token: SeDebugPrivilege 3336 8d325f4a56.exe Token: SeDebugPrivilege 4132 word.exe Token: SeDebugPrivilege 5664 word.exe Token: SeDebugPrivilege 2988 vector.exe -
Suspicious use of FindShellTrayWindow 32 IoCs
pid Process 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 2104 14cb490bf6.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 2104 14cb490bf6.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 700 firefox.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe 2104 14cb490bf6.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 700 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3092 3672 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe 83 PID 3672 wrote to memory of 3092 3672 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe 83 PID 3672 wrote to memory of 3092 3672 8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe 83 PID 3092 wrote to memory of 3976 3092 skotes.exe 84 PID 3092 wrote to memory of 3976 3092 skotes.exe 84 PID 3092 wrote to memory of 3976 3092 skotes.exe 84 PID 3976 wrote to memory of 1852 3976 qtmPs7h.exe 85 PID 3976 wrote to memory of 1852 3976 qtmPs7h.exe 85 PID 3976 wrote to memory of 1852 3976 qtmPs7h.exe 85 PID 1852 wrote to memory of 224 1852 cmd.exe 87 PID 1852 wrote to memory of 224 1852 cmd.exe 87 PID 1852 wrote to memory of 224 1852 cmd.exe 87 PID 3976 wrote to memory of 4880 3976 qtmPs7h.exe 88 PID 3976 wrote to memory of 4880 3976 qtmPs7h.exe 88 PID 3976 wrote to memory of 4880 3976 qtmPs7h.exe 88 PID 4880 wrote to memory of 3660 4880 cmd.exe 90 PID 4880 wrote to memory of 3660 4880 cmd.exe 90 PID 4880 wrote to memory of 3660 4880 cmd.exe 90 PID 1852 wrote to memory of 1520 1852 cmd.exe 97 PID 1852 wrote to memory of 1520 1852 cmd.exe 97 PID 1852 wrote to memory of 1520 1852 cmd.exe 97 PID 3092 wrote to memory of 1084 3092 skotes.exe 98 PID 3092 wrote to memory of 1084 3092 skotes.exe 98 PID 3092 wrote to memory of 1084 3092 skotes.exe 98 PID 3092 wrote to memory of 2072 3092 skotes.exe 106 PID 3092 wrote to memory of 2072 3092 skotes.exe 106 PID 3092 wrote to memory of 2072 3092 skotes.exe 106 PID 1084 wrote to memory of 3628 1084 7qg0CPF.exe 107 PID 1084 wrote to memory of 3628 1084 7qg0CPF.exe 107 PID 1084 wrote to memory of 3628 1084 7qg0CPF.exe 107 PID 4880 wrote to memory of 2680 4880 cmd.exe 110 PID 4880 wrote to memory of 2680 4880 cmd.exe 110 PID 4880 wrote to memory of 2680 4880 cmd.exe 110 PID 3092 wrote to memory of 1520 3092 skotes.exe 111 PID 3092 wrote to memory of 1520 3092 skotes.exe 111 PID 3092 wrote to memory of 1520 3092 skotes.exe 111 PID 3092 wrote to memory of 2104 3092 skotes.exe 120 PID 3092 wrote to memory of 2104 3092 skotes.exe 120 PID 3092 wrote to memory of 2104 3092 skotes.exe 120 PID 2104 wrote to memory of 3696 2104 14cb490bf6.exe 122 PID 2104 wrote to memory of 3696 2104 14cb490bf6.exe 122 PID 2104 wrote to memory of 3696 2104 14cb490bf6.exe 122 PID 2104 wrote to memory of 2308 2104 14cb490bf6.exe 125 PID 2104 wrote to memory of 2308 2104 14cb490bf6.exe 125 PID 2104 wrote to memory of 2308 2104 14cb490bf6.exe 125 PID 2104 wrote to memory of 2912 2104 14cb490bf6.exe 127 PID 2104 wrote to memory of 2912 2104 14cb490bf6.exe 127 PID 2104 wrote to memory of 2912 2104 14cb490bf6.exe 127 PID 2104 wrote to memory of 852 2104 14cb490bf6.exe 129 PID 2104 wrote to memory of 852 2104 14cb490bf6.exe 129 PID 2104 wrote to memory of 852 2104 14cb490bf6.exe 129 PID 2104 wrote to memory of 1996 2104 14cb490bf6.exe 131 PID 2104 wrote to memory of 1996 2104 14cb490bf6.exe 131 PID 2104 wrote to memory of 1996 2104 14cb490bf6.exe 131 PID 2104 wrote to memory of 3292 2104 14cb490bf6.exe 133 PID 2104 wrote to memory of 3292 2104 14cb490bf6.exe 133 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 PID 3292 wrote to memory of 700 3292 firefox.exe 134 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe"C:\Users\Admin\AppData\Local\Temp\8bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 7 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 75⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:224
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "word" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"5⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1520
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 16 > nul && copy "C:\Users\Admin\AppData\Local\Temp\1012982001\qtmPs7h.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe" && ping 127.0.0.1 -n 16 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 165⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3660
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 165⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2680
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\word.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵PID:5192
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"6⤵
- System Location Discovery: System Language Discovery
PID:5308 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"C:\Users\Admin\AppData\Local\Temp\10000760101\vector.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 12889⤵
- Program crash
PID:5448
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1544 -s 12569⤵
- Program crash
PID:5608
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\word.exe"C:\Users\Admin\AppData\Local\Temp\word.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5664
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"C:\Users\Admin\AppData\Local\Temp\1012992001\7qg0CPF.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmpD1A8.tmp.bat & Del C:\Users\Admin\AppData\Local\Temp\tmpD1A8.tmp.bat4⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013018001\3e1c6c9d12.exe"C:\Users\Admin\AppData\Local\Temp\1013018001\3e1c6c9d12.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 15004⤵
- Program crash
PID:2276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 14724⤵
- Program crash
PID:2012
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013019001\b9ce53d685.exe"C:\Users\Admin\AppData\Local\Temp\1013019001\b9ce53d685.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\1013020001\14cb490bf6.exe"C:\Users\Admin\AppData\Local\Temp\1013020001\14cb490bf6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2036 -parentBuildID 20240401114208 -prefsHandle 1952 -prefMapHandle 1944 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5a98fdfd-c9ad-417d-8bec-f521c103984c} 700 "\\.\pipe\gecko-crash-server-pipe.700" gpu6⤵PID:992
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1aba95fa-28d2-4106-8d6b-fb436b8da71d} 700 "\\.\pipe\gecko-crash-server-pipe.700" socket6⤵PID:4304
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3172 -childID 1 -isForBrowser -prefsHandle 3268 -prefMapHandle 3300 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {75927e70-9e0d-401f-91ea-eb7f5cb6df27} 700 "\\.\pipe\gecko-crash-server-pipe.700" tab6⤵PID:3896
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4064 -childID 2 -isForBrowser -prefsHandle 4056 -prefMapHandle 2764 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c170b05-be14-4b58-b76f-2b8c039a201b} 700 "\\.\pipe\gecko-crash-server-pipe.700" tab6⤵PID:3824
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4736 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4656 -prefMapHandle 4460 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {425add78-6ece-41b6-af7b-55e7573e1de7} 700 "\\.\pipe\gecko-crash-server-pipe.700" utility6⤵
- Checks processor information in registry
PID:5204
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5332 -childID 3 -isForBrowser -prefsHandle 5324 -prefMapHandle 5268 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {8a62a595-14bc-4ccb-bb5c-6debdd3d06dd} 700 "\\.\pipe\gecko-crash-server-pipe.700" tab6⤵PID:5936
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 4 -isForBrowser -prefsHandle 5576 -prefMapHandle 5572 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {adadd627-a075-4b59-bcce-484c55d213f1} 700 "\\.\pipe\gecko-crash-server-pipe.700" tab6⤵PID:5952
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5688 -childID 5 -isForBrowser -prefsHandle 5696 -prefMapHandle 5700 -prefsLen 27097 -prefMapSize 244658 -jsInitHandle 1248 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6c1877a9-eb40-4024-a7c5-ca7198de22df} 700 "\\.\pipe\gecko-crash-server-pipe.700" tab6⤵PID:5964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013021001\8d325f4a56.exe"C:\Users\Admin\AppData\Local\Temp\1013021001\8d325f4a56.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 464 -p 2072 -ip 20721⤵PID:3136
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 2072 -ip 20721⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5520
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1544 -ip 15441⤵PID:3420
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 1544 -ip 15441⤵PID:2932
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Query Registry
6Remote System Discovery
1System Information Discovery
4System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57dca233df92b3884663fa5a40db8d49c
SHA1208b8f27b708c4e06ac37f974471cc7b29c29b60
SHA25690c83311e35da0b5f8aa65aa2109745feb68ee9540e863f4ed909872e9c6a84c
SHA512d134b96fd33c79c85407608f76afc5a9f937bff453b1c90727a3ed992006c7d4c8329be6a2b5ba6b11da1a32f7cd60e9bc380be388b586d6cd5c2e6b1f57bd07
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD58aa6a06f1953b3cfa28958f4c65295a2
SHA10f242c018b60b2d010d9258edb4e0b1ec91af4aa
SHA25683f9165f166317a199a07b97c8462f3e8cce52b23291741dd5ee6fc09a8e7ad3
SHA5129518645f20dccfbbed5a36a2a873f53ba82bc6b9d79d4ef9d33367a7fe7e9854b1549e8661507594c7d6fcce96ab40a93da66f42dec5bdcd4427c49fc35c4a77
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5273704b1bc808a265d4b9aafecd507c1
SHA127db4820e42ce4ed8bd10d143ff69f12e0b5dd57
SHA25620f1404291c00dcbd02883099d46a7978e3b2a18294cf1f7afeafed453039050
SHA512eeaf7373bc40c10afbd39d68a45de79665a4d19149ed2e12bb77d29750ac71a3b8404428702637d78a14546279be174863af7e77ff478cbec598f10b10af0bf7
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\lhmx4teg.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
5.0MB
MD5b183e5ff29a1532a84e5a38983ab9e4e
SHA1230c9cbd2e14598aaf73ae78c85c998a6b923a51
SHA25681a45f430c102365b46c663203ae5708b6befe2848f01efc7b702aff7170c901
SHA51231be2761821fb6bc81a010a3f68fa6901aa5e9768e9c57db53b52e0495c7340abccc9191500aa39540fef159578403e78d2af31ac364b89774d5f359b54c6c1e
-
Filesize
2.5MB
MD5d1e3f88d0caf949d5f1b4bf4efbb95a4
SHA161ffd2589a1965bf9cb874833c4c9b106b3e43e8
SHA256c505f3b2f40b8a68e7cacfe2a9925498ab0f7ef29aa7023bb472597021066b2e
SHA5125d4c43e858371f24ebafb56388a586c081d7b0289a3b039dbb2b011e9864e8e9f5dc7037fcb3e88f4bec4259a09ce5f3ccdae3161b43dff140e0e4ca7bff96c3
-
Filesize
799KB
MD589bd66e4285cb7295300a941964af529
SHA1232d9fee67a3c3652a80e1c1a258f0d789c6a6cf
SHA256a46bf8412717f75bf098966cb1f5074836e78f5699bb5073dcc45d59ca790047
SHA51272d1c8c4b74bacca619a58062441203c6cfea81d064dc1933af7a3cb9758d924b011a6935e8d255aad58159a4ecbb3677cc6a6e80f6daa8b135711195a5c8498
-
Filesize
5.9MB
MD53297554944a2e2892096a8fb14c86164
SHA14b700666815448a1e0f4f389135fddb3612893ec
SHA256e0a9fcd5805e66254aa20f8ddb3bdfca376a858b19222b178cc8893f914a6495
SHA512499aa1679f019e29b4d871a472d24b89adddc68978317f85f095c7278f25f926cbf532c8520c2f468b3942a3e37e9be20aea9f83c68e8b5e0c9adbf69640ad25
-
Filesize
1.8MB
MD54ac9141ca54abebc30ba2dbbd8202328
SHA10af8d99177f5a204341e92179e3df4fc7250f55b
SHA25626617312efc260714a32d2fb9f34581833a9437197f35a0ecfd091eb48518c36
SHA51211111f1dc8e17e935f138800ec358084a4ddc31475b2ea52af58c83539c48425f8831a7449e87bf9df2551930c4891db7a2f78fa0df1cf711f9268ef6922e720
-
Filesize
1.7MB
MD55d5cbdd1801035e2485e7353df38e0c3
SHA1569f6804a09e94d2413f0239c26a7e47734178a3
SHA256678b506795611f59eec55a7003e31a378679db301b5669cdf8d2c9b0826cfede
SHA51236d5081f994c44774548fcb8fa05d3461f1cc823b62fab79b949bafc3e26f457a58f278bce3fccaa79d43b92607ce61d38d687fcffa8863e273321cf493c75ea
-
Filesize
951KB
MD576c2c0bba853abfff5189ac4c5bbfa7b
SHA15e360faf571e5623ecc24bc075dd990038689fed
SHA256fdc3cce2d6bad9345ec450432e8456b645d73a5a9d1852da73444c5976f4488f
SHA512739c03ebe636c78aa7d2d4da6fe2066886dcdff63bcd644150c75e52a724ae7559dc3f1e0b5425e74f9abd3873295e6b1f3ae0b7b1777222bb0b702a0cfca6ff
-
Filesize
2.7MB
MD5fbb08fc5dee68a2eeaeb7c1d17493afd
SHA1d87a00662b3348fd21ace933f094e89ba64ad377
SHA25674d427ab9ed2d9e35230134138b929b7528054e7a1330ca4f50997746b0cd55c
SHA51239fa6630e5f50dee9ef6216c954fdf64507fe940ee3211e2a6eb0ba659036d655b14aae8f61d88049d83fe7c3eda9c629844d8a005ad96b08efbacdd7fed2176
-
Filesize
1.4MB
MD56f2fdecc48e7d72ca1eb7f17a97e59ad
SHA1fcbc8c4403e5c8194ee69158d7e70ee7dbd4c056
SHA25670e48ef5c14766f3601c97451b47859fddcbe7f237e1c5200cea8e7a7609d809
SHA512fea98a3d6fff1497551dc6583dd92798dcac764070a350fd381e856105a6411c94effd4b189b7a32608ff610422b8dbd6d93393c5da99ee66d4569d45191dc8b
-
Filesize
3.1MB
MD52ac272fb2ffce59ba9a41c321a1ca05b
SHA1b96d37991e9443f22e3f49196e5059093fe18c23
SHA2568bb5b63c02b4de956f77bad2d4a46b3aff4b931281c923db036016ad9ed3f8ec
SHA51231d9ad1a6f88218ce56e5a0cea77eee364091f72fd3e5a2e96c7ce300bbec3b98c2440bc40b52740614a229ab71903e7222d3d6f905c73f56396545ce18df42d
-
Filesize
186B
MD5790dd6f9aab53b59e358a126dc5d59fc
SHA1ec6bf3eb0fa5d2e37c694bf71254e0ce0be1a5fc
SHA2567ca8c160037742b7da30366775d7aae7882a98e1fbfdbbefb743c2a93d6b1c52
SHA512a9d819b8d771febfa027de6f201d4effaf7bdd3334255707dddceb57b2b322649698903ee5d72f0e431780d29b01abedd5250d372100e6c66c0639965f86c7ef
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
76KB
MD50e362e7005823d0bec3719b902ed6d62
SHA1590d860b909804349e0cdc2f1662b37bd62f7463
SHA2562d0dc6216f613ac7551a7e70a798c22aee8eb9819428b1357e2b8c73bef905ad
SHA512518991b68496b3f8545e418cf9b345e0791e09cc20d177b8aa47e0aba447aa55383c64f5bdaca39f2b061a5d08c16f2ad484af8a9f238ca23ab081618fba3ad3
-
Filesize
91B
MD5fa51e9138b1db38f848f2444333d6c2b
SHA12e46fbc4fff87851f570e3969ba01a9fcd3a74c9
SHA25677cf635271d5641a6b7c47b365afbba2e03f9e54cb4ecc4415f7badf328907f0
SHA512eb3c99225f69c37535b7cce7aad051641c9b43da7107e8f43b7accdc2d132511b23104f30746bd58deee9180ac39332b6cb5b6991d6e0eeec4da49fddb1223e3
-
Filesize
91B
MD583c34a25a6d317eba950961dcf68c2c7
SHA193e1a64bb59c29f331cc2da167f12ce081d68472
SHA256fc111f410bb84fd18f1d21efdd78f7164e094b083f579c58e29d6c4976fff5b4
SHA5123372fdbc0b573e9df1e55899a30538ea8636734e59cb4830910700a51b027907b7974df304ddd87b1b71898f7188ab5db437580f5c905cdb27c58fa9101fc285
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize6KB
MD51c730e4a710bb510299428f8fef03416
SHA1040c8c4577354b529873a277b76609bc17bf0362
SHA256a2c5034d5c81f845e47a741e5ea84a03ebe66d89712fedc0950803138a055dd6
SHA512526079b51a42e667f9159b820d77efe28cc4b21243265fef7d639a163bf4b33471ced848030633d94d419d290759ae83b7c24ed913c489337d75b4701de39f0e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize8KB
MD508cc29203b960374bfedf55921e4b075
SHA1db4ae0feee576cd38a07a9920a3620e1505d328c
SHA256977f75372b612aa0ca2beab11b192a9497ccda7f46fa07c4aba6bdd13166e4ad
SHA51225703aa8b1cda4996bacec20b98e908f5a45cc2e60bbfd388f4fb46ed16ac6bb9d3667b714e68278a36c887254663ebc35b4dcaeeaf0ff6cf43bc39b645cd5ac
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\AlternateServices.bin
Filesize12KB
MD597da7089e545aca12b7aab129e74a336
SHA100e15dabd9d55704d4b2306c78d7ab0fb8331495
SHA2562944e591f4e46918cf0a68fa6d969dc3f592ccba441487e87476bc3da6d491a0
SHA512158f82cece0d2845c962f43a6ab318423136a23595aa08ecaa691dbb461c7456b37720ad9b88194d4ec7ba38c94a326432ded6064614b095eb10d65bbba4103b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5fefdced6dc3c4c51f38dfe8fce0f9c45
SHA197c3991b6e5fb717742c932d5c632c00f6909dc6
SHA256103d965a135b91fb72ecb300b96a7be66edf773e2e170e4f3276ef6fb461d282
SHA51234df7bbf4825b07e233874bd896662ee301381b6e2fa63c5a8a25c7832e906c9bc90efebbf9e31d2249ea9fa8af831cfce5df0be3746459dabf3b63ffe1b8728
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD509ae38d0368316165ac472cb0652b484
SHA170bf748d22415a67e5ca1b50f6e3bb6f0899e883
SHA256ae2a7255decd32d5036e0454feedf27e9748af07c556e41ec5898c0c67909fff
SHA5120bba90e96035103c3f80ab3114c4a25a629582d32aee6a6f850fee0e693d55a7375e8f6aa20f3f18e22615c383917e548f7a64927b847ade7fde1053570c35bd
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5173d72818b5e2648b6ca6de50ad72107
SHA1b58bc3e1be0269d73d57c8bbf745d855152eba56
SHA256df55b9dccada036927d11691545619572700bebbee0e122a9224f886fb4b2064
SHA512e621ce93647370f7ffacc098be56c6e9bf84e80ee225f42f03c90608a527e4f5162b810612b180a726f44bcd9858d3764cf0cf339c97314bcf809283c91fb2d0
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5ae0d0891d7243c875ed4abc2266ec393
SHA155a2c20027929032efd48d677fe8fa9bb6f50ac1
SHA25654b9506b165cc7206f4d19d882906ea18e8eaab48de92c2b4699285cb3a76b42
SHA512654c88b126e1b313fcdec50219e5237a3471d6ab7e4192d062cf563b0853ec0be3331ea8d2c8e1d992343fb62ddc65d80b01912b00d7c9faec38111437a8f67f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\25e186b3-656e-4fe4-af72-b4c9d6307586
Filesize671B
MD524b61627b5e50f4186004939acc68d94
SHA1ca2d06d5f0b06cee3ccad96536487a9e9bceb1d6
SHA256dab9d34a8603f49ce4fb8fae15698ba510f14503a936d1cd7f7abe9a238f3be0
SHA512f5958c7d7b1f6063d22e5ba5f33bdf64f2378bfed7e748d9b13793f5e8fe4b3f54524014c1599d3821e54ea8210bb9ccda1858186dfc67f55828b7b56b10364a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\c058afd5-5406-41d7-b79c-882211734dd7
Filesize27KB
MD517a2cd69538c46013f50b30539809558
SHA1fbcc2534e1960f4456d596fa3911d1ed8ab73677
SHA25622f4608340daea5c05c8f8778003ac03605b593d34270cb03ece677e18f7f724
SHA512c1f4dd7f8c91954858c491c3825d67ec522b09f06656794b52a7976511983d21f5f1b69bba1abcf0cafcfa2583378ad28f675a31d7cba980db4a4895d2ddf07d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\datareporting\glean\pending_pings\f51e6102-5ac2-4178-8fb3-8effe3523e41
Filesize982B
MD50ff8cbe5697cf45d1d193af790c299d0
SHA12ace5fee552bf9c35c4311d60ed84c8045a0008b
SHA256723c879bbd881ba1aa379b8c800a3f57892e19b937a952c5e00ccc34e34fe7f5
SHA5125ff0fcb28758d85b7e31eacde2a2fc13b4d258dd9e213786abf88dc47ae0ab849320561203d2dc72805ca49203bd6d0e7daedba08271ce26980d789e425bf055
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\lhmx4teg.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
11KB
MD5c946dc326d66dc9b982b3d8218f1a0f4
SHA1e69df403cfc4ca7f74c40820df877318292af15f
SHA256d61f85a4c16a16973ff88cf2a7e811a2338bf83a78febd65d14630d0781fa7a6
SHA51273cb1d86cff1d20c7e0aea27bea1e97f05fcddcdd426f38809bdbf7e346735853b4c619f5166fc1f676ecb26956898ef53ec2cb2a21686cffe5cd86b3b8ec016
-
Filesize
15KB
MD563ded7e189f3cb1a944e148b6ab821ff
SHA1d14f44b4ad98877e35496815fbd20a06ba77665a
SHA256a1bf4670355db570949a0d118c299bfc5c1f2f6a571deb15c2ff7938265bd36a
SHA5122b6d39ac3a342a368f5eb8999e65b895d2b143a71e54f187bf3a4eedb71d124475be9d3a9e0750870bc5c078e1585b227404915ce29b7337a83064293f591590
-
Filesize
11KB
MD5f7210ab9fc9b225539e52ea7c85a30a6
SHA1d56514d864160da82f0d4514ddfa7b2bfca58a2f
SHA2568296503d1ba4700cfb42e536cea38c7ee663025eaf481036b0692a241578ea2a
SHA5122d64d01fba101dc8270d50c2333d7775f735f1b8b20b0e9992e6ba6ad48619bfb0682ec7da32fc15b50fea04da3432e37fe8429da4ccda2ff4f34237d464e35e