Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
00f1718a71efde55171038cbc3f56c69
-
SHA1
a0e1bedb9376ed03e940d3ba689e26c11e8ce322
-
SHA256
9817cd94109082f2785601910e4e31258e5e34df3d9f6787245763ecc32259dd
-
SHA512
6593fc5e9ec96710c5275f554921680155e6939bd6160149698be29404d7b8fa96ea8368ce86fba34d6f53867e7b6b92d1fcffabd61504fa00abc00402debedc
-
SSDEEP
24576:DK3zzsooJ+dgEzioTZFtO883VJKuEaX34x+K3DQ3BLFqKRMM+1e+bt1T758KP8aH:DK3nsoFHwBz6vD55Bf608g9YeZ6sfs
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6d01b0605a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6d01b0605a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6d01b0605a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 6d01b0605a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6d01b0605a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6d01b0605a.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4307c2a336.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 33cbdbb2b1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6d01b0605a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4307c2a336.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 33cbdbb2b1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6d01b0605a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6d01b0605a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4307c2a336.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 33cbdbb2b1.exe -
Executes dropped EXE 5 IoCs
pid Process 2780 skotes.exe 1660 4307c2a336.exe 628 33cbdbb2b1.exe 1972 691474e124.exe 1736 6d01b0605a.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 6d01b0605a.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 4307c2a336.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 33cbdbb2b1.exe -
Loads dropped DLL 8 IoCs
pid Process 2944 file.exe 2944 file.exe 2780 skotes.exe 2780 skotes.exe 2780 skotes.exe 2780 skotes.exe 2780 skotes.exe 2780 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 6d01b0605a.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6d01b0605a.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\6d01b0605a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013025001\\6d01b0605a.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\4307c2a336.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013022001\\4307c2a336.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\33cbdbb2b1.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013023001\\33cbdbb2b1.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\691474e124.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013024001\\691474e124.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019263-75.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2944 file.exe 2780 skotes.exe 1660 4307c2a336.exe 628 33cbdbb2b1.exe 1736 6d01b0605a.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4307c2a336.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 691474e124.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d01b0605a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 33cbdbb2b1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 691474e124.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 691474e124.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 596 taskkill.exe 2632 taskkill.exe 2316 taskkill.exe 2228 taskkill.exe 1572 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2944 file.exe 2780 skotes.exe 1660 4307c2a336.exe 628 33cbdbb2b1.exe 1972 691474e124.exe 1736 6d01b0605a.exe 1972 691474e124.exe 1972 691474e124.exe 1736 6d01b0605a.exe 1736 6d01b0605a.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1572 taskkill.exe Token: SeDebugPrivilege 596 taskkill.exe Token: SeDebugPrivilege 2632 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 2228 taskkill.exe Token: SeDebugPrivilege 2052 firefox.exe Token: SeDebugPrivilege 2052 firefox.exe Token: SeDebugPrivilege 1736 6d01b0605a.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2944 file.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 2052 firefox.exe 2052 firefox.exe 2052 firefox.exe 2052 firefox.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 2052 firefox.exe 2052 firefox.exe 2052 firefox.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe 1972 691474e124.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2944 wrote to memory of 2780 2944 file.exe 31 PID 2944 wrote to memory of 2780 2944 file.exe 31 PID 2944 wrote to memory of 2780 2944 file.exe 31 PID 2944 wrote to memory of 2780 2944 file.exe 31 PID 2780 wrote to memory of 1660 2780 skotes.exe 33 PID 2780 wrote to memory of 1660 2780 skotes.exe 33 PID 2780 wrote to memory of 1660 2780 skotes.exe 33 PID 2780 wrote to memory of 1660 2780 skotes.exe 33 PID 2780 wrote to memory of 628 2780 skotes.exe 34 PID 2780 wrote to memory of 628 2780 skotes.exe 34 PID 2780 wrote to memory of 628 2780 skotes.exe 34 PID 2780 wrote to memory of 628 2780 skotes.exe 34 PID 2780 wrote to memory of 1972 2780 skotes.exe 36 PID 2780 wrote to memory of 1972 2780 skotes.exe 36 PID 2780 wrote to memory of 1972 2780 skotes.exe 36 PID 2780 wrote to memory of 1972 2780 skotes.exe 36 PID 1972 wrote to memory of 1572 1972 691474e124.exe 37 PID 1972 wrote to memory of 1572 1972 691474e124.exe 37 PID 1972 wrote to memory of 1572 1972 691474e124.exe 37 PID 1972 wrote to memory of 1572 1972 691474e124.exe 37 PID 1972 wrote to memory of 596 1972 691474e124.exe 39 PID 1972 wrote to memory of 596 1972 691474e124.exe 39 PID 1972 wrote to memory of 596 1972 691474e124.exe 39 PID 1972 wrote to memory of 596 1972 691474e124.exe 39 PID 1972 wrote to memory of 2632 1972 691474e124.exe 41 PID 1972 wrote to memory of 2632 1972 691474e124.exe 41 PID 1972 wrote to memory of 2632 1972 691474e124.exe 41 PID 1972 wrote to memory of 2632 1972 691474e124.exe 41 PID 1972 wrote to memory of 2316 1972 691474e124.exe 43 PID 1972 wrote to memory of 2316 1972 691474e124.exe 43 PID 1972 wrote to memory of 2316 1972 691474e124.exe 43 PID 1972 wrote to memory of 2316 1972 691474e124.exe 43 PID 1972 wrote to memory of 2228 1972 691474e124.exe 45 PID 1972 wrote to memory of 2228 1972 691474e124.exe 45 PID 1972 wrote to memory of 2228 1972 691474e124.exe 45 PID 1972 wrote to memory of 2228 1972 691474e124.exe 45 PID 1972 wrote to memory of 1000 1972 691474e124.exe 47 PID 1972 wrote to memory of 1000 1972 691474e124.exe 47 PID 1972 wrote to memory of 1000 1972 691474e124.exe 47 PID 1972 wrote to memory of 1000 1972 691474e124.exe 47 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 1000 wrote to memory of 2052 1000 firefox.exe 48 PID 2052 wrote to memory of 2196 2052 firefox.exe 49 PID 2052 wrote to memory of 2196 2052 firefox.exe 49 PID 2052 wrote to memory of 2196 2052 firefox.exe 49 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 PID 2052 wrote to memory of 2248 2052 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\1013022001\4307c2a336.exe"C:\Users\Admin\AppData\Local\Temp\1013022001\4307c2a336.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\1013023001\33cbdbb2b1.exe"C:\Users\Admin\AppData\Local\Temp\1013023001\33cbdbb2b1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\1013024001\691474e124.exe"C:\Users\Admin\AppData\Local\Temp\1013024001\691474e124.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.0.1211797998\901483552" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {afd50c0a-9857-4a02-a23d-2ed0a8088ffb} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 1280 10bd7e58 gpu6⤵PID:2196
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.1.777029976\1422784650" -parentBuildID 20221007134813 -prefsHandle 1484 -prefMapHandle 1480 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b80ab831-463c-4324-97f6-2e4aadc17ae5} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 1496 d73658 socket6⤵PID:2248
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.2.1869927796\179426439" -childID 1 -isForBrowser -prefsHandle 2060 -prefMapHandle 2056 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {020543ee-71f4-4cb0-b988-44191e7c977c} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 2072 10b62058 tab6⤵PID:1472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.3.56198979\1133779447" -childID 2 -isForBrowser -prefsHandle 2920 -prefMapHandle 2916 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {285f1d29-4947-4224-97d9-3c530687c290} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 2932 1d212a58 tab6⤵PID:1328
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.4.1764017794\1692348190" -childID 3 -isForBrowser -prefsHandle 3732 -prefMapHandle 3728 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3d963f6f-1abd-4871-9df8-d58545eba940} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 3744 1f3aa958 tab6⤵PID:2232
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.5.853209313\606551037" -childID 4 -isForBrowser -prefsHandle 3940 -prefMapHandle 3840 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {91011d20-8035-481d-a0fc-7aa3190129e1} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 3956 20627e58 tab6⤵PID:2316
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2052.6.2130226705\590980099" -childID 5 -isForBrowser -prefsHandle 4016 -prefMapHandle 4020 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 852 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {78e06ec2-c005-4b3c-aae3-7066a86f5041} 2052 "\\.\pipe\gecko-crash-server-pipe.2052" 4004 206e6b58 tab6⤵PID:1784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013025001\6d01b0605a.exe"C:\Users\Admin\AppData\Local\Temp\1013025001\6d01b0605a.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD50122179c4efe68a951118ee7e6b306b7
SHA10e2ee33ac0093675bed07485ce1fb1c6441979fc
SHA256ac7de3863ef0c1883edf51c6e5d92ad43ef3306b8b82f5a5a1b0d4c4c783d837
SHA51239062777b6c798a8a2bca68f2045b857281e55be2d9a953d860382f090fc6901742e60b3fdf83233f9cef6bc5c9235b63b904416f09cfe575b034f2e5a02fd83
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD54ac9141ca54abebc30ba2dbbd8202328
SHA10af8d99177f5a204341e92179e3df4fc7250f55b
SHA25626617312efc260714a32d2fb9f34581833a9437197f35a0ecfd091eb48518c36
SHA51211111f1dc8e17e935f138800ec358084a4ddc31475b2ea52af58c83539c48425f8831a7449e87bf9df2551930c4891db7a2f78fa0df1cf711f9268ef6922e720
-
Filesize
1.7MB
MD55d5cbdd1801035e2485e7353df38e0c3
SHA1569f6804a09e94d2413f0239c26a7e47734178a3
SHA256678b506795611f59eec55a7003e31a378679db301b5669cdf8d2c9b0826cfede
SHA51236d5081f994c44774548fcb8fa05d3461f1cc823b62fab79b949bafc3e26f457a58f278bce3fccaa79d43b92607ce61d38d687fcffa8863e273321cf493c75ea
-
Filesize
951KB
MD576c2c0bba853abfff5189ac4c5bbfa7b
SHA15e360faf571e5623ecc24bc075dd990038689fed
SHA256fdc3cce2d6bad9345ec450432e8456b645d73a5a9d1852da73444c5976f4488f
SHA512739c03ebe636c78aa7d2d4da6fe2066886dcdff63bcd644150c75e52a724ae7559dc3f1e0b5425e74f9abd3873295e6b1f3ae0b7b1777222bb0b702a0cfca6ff
-
Filesize
2.7MB
MD5fbb08fc5dee68a2eeaeb7c1d17493afd
SHA1d87a00662b3348fd21ace933f094e89ba64ad377
SHA25674d427ab9ed2d9e35230134138b929b7528054e7a1330ca4f50997746b0cd55c
SHA51239fa6630e5f50dee9ef6216c954fdf64507fe940ee3211e2a6eb0ba659036d655b14aae8f61d88049d83fe7c3eda9c629844d8a005ad96b08efbacdd7fed2176
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5fca6e336d12102163a42bd2c99e82c6a
SHA1606fdefa1397fcf19d17e55627c770478ea5c4f1
SHA256d73ec8aa572130b402071ee11d17b88472066f34100c98f3f80f32c32ab81cf3
SHA5122ca451a9870649cf67989c3948df5d59ee9bf4d94f577f498ad9828a277a15860a5ecd1db8416b7a5c4d58a3eecc619d48b38b625eb425651cebcebebc8f9a2c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\995161a4-7686-440d-94f8-8ae5c9e30a9f
Filesize10KB
MD5e3304ad83b51976f01a8db5f301bf223
SHA199c443b30f89851f0f424e8387b7e72dc66a7955
SHA25622d77f5d2818540c01bb9a850197be69bbf5399a93d1ea1a98f8f01bdb8c8a4e
SHA51207b31b68d110b0a90d6563393d5afcf88309aed7fdc049a780d28a33514ab4d0ae3615f457b52163c5c25bfcfabe248365d4d6bf6b6477fce16347a5f6dc6fe7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\f39027c2-5186-4676-9068-15128cc3b4bf
Filesize745B
MD5705ec4e54560444c9b56c18bacefae43
SHA1683149dab0bd2c3ed06efde58035ccce356b98b8
SHA256f7691014286fb8ca04e5d9b54d0b882f335ea9817b32832bec2e0e7f69d7994f
SHA5120a322f57ea901359b30680befb798a00662b80d09b57a461e7f741c7bad7c433bbecbc9b3a79e4d0f98382e1c229f8e470a26da63dfc09f19406b2d607c816d9
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD5f436a8fd7a729c1c8cbd48e8bc7bb647
SHA1874ac1fd9cab01246df19c69f74ac436509fc148
SHA2565fdd751173936320f4e1416eab2ed8d31f6c8d571036f080e4878947f49aae73
SHA5127eb12104e10ab1157ac70ee86604407c1029809fce253cfba7d52a4aa23cfd44914002c395485b340446b206e18593e79ea3eec8bdd81e5cc6d7cc89189a52cf
-
Filesize
7KB
MD54862108ec2109b9a5b7641fecc853fd7
SHA1fca73691f7e37db9fe900febc43e5ebb043e6d2e
SHA256572606489a8bf1ccc440d3c4b4855fc07aa17b6cea899574578f7c786d0bc43e
SHA5128b49fb658a839f94c1cf36ec2b63a7a510d59b00e8edcd76a4ed53f2f815ba71d666ef4c80319dda58016766140e32d11ae996c4b859339123b2e8de4cd95917
-
Filesize
6KB
MD5d3cbaa3898189a8174bb713a39117f29
SHA140876e52f226ff80b31509a9a1dd502a1c9b6510
SHA2569c309bb17ccc1a87586dec1033b4973f8ba8f32f08d192a4e53f774b285e3d9e
SHA512bd8ff7cb6b4e3dab4d69d901a7c6b7e09370bed9dce19d20ce3a98855b2580ed2116450b406b08836e5df5bec41a6444b9e03c9664c01de45ee62acab7be133e
-
Filesize
6KB
MD557778427eabf1872276e0885b1216c5a
SHA1a8c0300bd8d41799b284918fe91ec585b71e0e4e
SHA256f9a9f40bc89b8ba643b319aea3177ea553d5b84ba1a88049ed97e5c88507b378
SHA5120dc92806ab3f172bcb938dca7fa45722fa866cede99ca661533431c8373554405d9a6c81cb81653b80b7f88fbfb3e4719789047cb61b3469d7cd4c3062066ccb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD537c79c6eaaaa48bb0ed1dc7b9024938c
SHA13955bbeae2405cc37ddc3b22f62c57978d650303
SHA256e2bebf40e3effaa1a8dfff03d40d93abe7a85e590c39f3c10c7e3d85348557b3
SHA512de8597eed8592e9a5d60b32d36541e94c137b2909115fbbbe2d286474792e53a67a15c3ba0b624a18dedd4cf8a6f2d0b1c10f1a5a2fc07df8fffdf7c2c1b2b8f
-
Filesize
3.0MB
MD500f1718a71efde55171038cbc3f56c69
SHA1a0e1bedb9376ed03e940d3ba689e26c11e8ce322
SHA2569817cd94109082f2785601910e4e31258e5e34df3d9f6787245763ecc32259dd
SHA5126593fc5e9ec96710c5275f554921680155e6939bd6160149698be29404d7b8fa96ea8368ce86fba34d6f53867e7b6b92d1fcffabd61504fa00abc00402debedc