Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
08/12/2024, 00:02
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
071fd9342e197ab323e93e0395fadbd0
-
SHA1
23bac802089af599de74f3f43c82319bad647a53
-
SHA256
4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
-
SHA512
abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a
-
SSDEEP
49152:O7SbZvl/c4t4L2agJhXhI759UomVfm8RZsF:O7SbZvl/c4tRazd9TmVuWZsF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dded1a10e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dded1a10e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dded1a10e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dded1a10e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dded1a10e6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection dded1a10e6.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f2244d8ba5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ccd1cd5990.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dded1a10e6.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dded1a10e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dded1a10e6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ccd1cd5990.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f2244d8ba5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f2244d8ba5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ccd1cd5990.exe -
Executes dropped EXE 5 IoCs
pid Process 2828 skotes.exe 1072 f2244d8ba5.exe 3036 ccd1cd5990.exe 1360 c495b413a8.exe 1816 dded1a10e6.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine f2244d8ba5.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine ccd1cd5990.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine dded1a10e6.exe -
Loads dropped DLL 8 IoCs
pid Process 1504 file.exe 1504 file.exe 2828 skotes.exe 2828 skotes.exe 2828 skotes.exe 2828 skotes.exe 2828 skotes.exe 2828 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features dded1a10e6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dded1a10e6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\f2244d8ba5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013060001\\f2244d8ba5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ccd1cd5990.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013061001\\ccd1cd5990.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\c495b413a8.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013062001\\c495b413a8.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\dded1a10e6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013063001\\dded1a10e6.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a42d-75.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1504 file.exe 2828 skotes.exe 1072 f2244d8ba5.exe 3036 ccd1cd5990.exe 1816 dded1a10e6.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccd1cd5990.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c495b413a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c495b413a8.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c495b413a8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dded1a10e6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2244d8ba5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2384 taskkill.exe 2836 taskkill.exe 1536 taskkill.exe 2576 taskkill.exe 576 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1504 file.exe 2828 skotes.exe 1072 f2244d8ba5.exe 3036 ccd1cd5990.exe 1360 c495b413a8.exe 1816 dded1a10e6.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1816 dded1a10e6.exe 1816 dded1a10e6.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2384 taskkill.exe Token: SeDebugPrivilege 2836 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 576 taskkill.exe Token: SeDebugPrivilege 1900 firefox.exe Token: SeDebugPrivilege 1900 firefox.exe Token: SeDebugPrivilege 1816 dded1a10e6.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 1504 file.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1900 firefox.exe 1900 firefox.exe 1900 firefox.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe 1360 c495b413a8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1504 wrote to memory of 2828 1504 file.exe 31 PID 1504 wrote to memory of 2828 1504 file.exe 31 PID 1504 wrote to memory of 2828 1504 file.exe 31 PID 1504 wrote to memory of 2828 1504 file.exe 31 PID 2828 wrote to memory of 1072 2828 skotes.exe 33 PID 2828 wrote to memory of 1072 2828 skotes.exe 33 PID 2828 wrote to memory of 1072 2828 skotes.exe 33 PID 2828 wrote to memory of 1072 2828 skotes.exe 33 PID 2828 wrote to memory of 3036 2828 skotes.exe 35 PID 2828 wrote to memory of 3036 2828 skotes.exe 35 PID 2828 wrote to memory of 3036 2828 skotes.exe 35 PID 2828 wrote to memory of 3036 2828 skotes.exe 35 PID 2828 wrote to memory of 1360 2828 skotes.exe 36 PID 2828 wrote to memory of 1360 2828 skotes.exe 36 PID 2828 wrote to memory of 1360 2828 skotes.exe 36 PID 2828 wrote to memory of 1360 2828 skotes.exe 36 PID 1360 wrote to memory of 2384 1360 c495b413a8.exe 37 PID 1360 wrote to memory of 2384 1360 c495b413a8.exe 37 PID 1360 wrote to memory of 2384 1360 c495b413a8.exe 37 PID 1360 wrote to memory of 2384 1360 c495b413a8.exe 37 PID 1360 wrote to memory of 2836 1360 c495b413a8.exe 39 PID 1360 wrote to memory of 2836 1360 c495b413a8.exe 39 PID 1360 wrote to memory of 2836 1360 c495b413a8.exe 39 PID 1360 wrote to memory of 2836 1360 c495b413a8.exe 39 PID 1360 wrote to memory of 1536 1360 c495b413a8.exe 41 PID 1360 wrote to memory of 1536 1360 c495b413a8.exe 41 PID 1360 wrote to memory of 1536 1360 c495b413a8.exe 41 PID 1360 wrote to memory of 1536 1360 c495b413a8.exe 41 PID 1360 wrote to memory of 2576 1360 c495b413a8.exe 43 PID 1360 wrote to memory of 2576 1360 c495b413a8.exe 43 PID 1360 wrote to memory of 2576 1360 c495b413a8.exe 43 PID 1360 wrote to memory of 2576 1360 c495b413a8.exe 43 PID 1360 wrote to memory of 576 1360 c495b413a8.exe 45 PID 1360 wrote to memory of 576 1360 c495b413a8.exe 45 PID 1360 wrote to memory of 576 1360 c495b413a8.exe 45 PID 1360 wrote to memory of 576 1360 c495b413a8.exe 45 PID 1360 wrote to memory of 1568 1360 c495b413a8.exe 47 PID 1360 wrote to memory of 1568 1360 c495b413a8.exe 47 PID 1360 wrote to memory of 1568 1360 c495b413a8.exe 47 PID 1360 wrote to memory of 1568 1360 c495b413a8.exe 47 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1568 wrote to memory of 1900 1568 firefox.exe 48 PID 1900 wrote to memory of 1484 1900 firefox.exe 49 PID 1900 wrote to memory of 1484 1900 firefox.exe 49 PID 1900 wrote to memory of 1484 1900 firefox.exe 49 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 PID 1900 wrote to memory of 2760 1900 firefox.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\1013060001\f2244d8ba5.exe"C:\Users\Admin\AppData\Local\Temp\1013060001\f2244d8ba5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1072
-
-
C:\Users\Admin\AppData\Local\Temp\1013061001\ccd1cd5990.exe"C:\Users\Admin\AppData\Local\Temp\1013061001\ccd1cd5990.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\1013062001\c495b413a8.exe"C:\Users\Admin\AppData\Local\Temp\1013062001\c495b413a8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:576
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.0.1064673752\1885162610" -parentBuildID 20221007134813 -prefsHandle 1216 -prefMapHandle 1208 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {4043053c-5e95-4c3d-a78a-6fd679db3abb} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 1292 122d8a58 gpu6⤵PID:1484
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.1.2088936406\1031528105" -parentBuildID 20221007134813 -prefsHandle 1480 -prefMapHandle 1476 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {5c783e81-903b-44f6-be66-c76cbd3a6d3a} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 1492 d71558 socket6⤵PID:2760
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.2.49021090\174629039" -childID 1 -isForBrowser -prefsHandle 2084 -prefMapHandle 2080 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {02b52873-f899-4c4c-aeed-eb942cac037d} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 2096 1a9db058 tab6⤵PID:2916
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.3.486249010\206532962" -childID 2 -isForBrowser -prefsHandle 2824 -prefMapHandle 2820 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a93b5692-20bf-47eb-8a58-f8bff14a5c25} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 2836 1baa3b58 tab6⤵PID:1072
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.4.731792011\518717789" -childID 3 -isForBrowser -prefsHandle 3728 -prefMapHandle 3640 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9b0bdfeb-28e2-41fb-8221-2c76f38f7acd} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 3740 1f2a7a58 tab6⤵PID:2424
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.5.1764982857\1489331309" -childID 4 -isForBrowser -prefsHandle 3372 -prefMapHandle 892 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {11a7221c-bd08-4d30-9a77-eb533ef580d1} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 1092 20a0c958 tab6⤵PID:1568
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="1900.6.107548968\665164689" -childID 5 -isForBrowser -prefsHandle 3972 -prefMapHandle 3976 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 868 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {98a03d70-2b9b-4132-9d67-8dafafead1e1} 1900 "\\.\pipe\gecko-crash-server-pipe.1900" 3868 20ac0b58 tab6⤵PID:2892
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013063001\dded1a10e6.exe"C:\Users\Admin\AppData\Local\Temp\1013063001\dded1a10e6.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD51df1b36516801927f3de2259dde136b2
SHA13a2926a3e61e6b6711766bc0889844bceabe1fac
SHA25679a45e484c13bca54ad4059dc6e3f574db32372cac81b026d99bda6d25e4909a
SHA512b574a2254a3822995dba5b9615f44904add4fcfb17e4b50521c1aa6bfa1d7c887cc8c4042d06e91d02e948e5bfe0e0c5c2f989179b5a8df25c6ed8778afab22a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\n3lsnn48.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD55fb2b7580911f21bbb4796c243f64201
SHA1749b297f4236e65c1537e0d78f338a703fe5fc17
SHA256249ce266acab1c44290fc30a908803ffd4e15ebfb49a86934a6b1c7f8e87d7b9
SHA512c2fd8afe879c1a8d4b3f35a1634ed5d30447b07bbfefa3e583ebd9b2cebfcd6f97faafd72ca39930c2fa66a996742bbb489dcc8e12c15dba861866cab889ae3a
-
Filesize
1.7MB
MD5e3dfbe72de430b4043393fb8ff8e2384
SHA147fc80752fa0339680a1b3cb3d4b1ba5d0a502c5
SHA2562a78168b664e599c73fae2fb2f42c2198a7eb21453f8125e8393cde02129e101
SHA512e9b40a49f868e2c36d706b4075b538d243f9e844cb0169985c3f03fe7dd0d60aec28374a2a1ca5c473efa9237f867e371f746e752ecf75c3c1c8f56e60c4a461
-
Filesize
945KB
MD5d9084af8fc090745072e77ac91671271
SHA1ca663d52281dfc87615c0574483cac704bd4c142
SHA256c5f18adfaa14002d42a2d38b7e707adb95276c1a35647013f181ea1a3d8612c7
SHA512d2f10f8bb0f964d7c076e32b53d5bc0fbd6249ac3d03560b3fec6e028c90d86b72bd89261e5a062da19ed3e5a54db2ffdda2f8560aa29e118a186d002849006a
-
Filesize
2.7MB
MD507df0ca2efa663656921765b094f6ade
SHA1cf77c41d3b34051fb091198d4d919b4902286282
SHA256f2ed88fc61e9dcd459aef1b3bd354d28399f7e02d50fac27841eb7d6a085420d
SHA512efb6857aafe710f41137431242233d048ba88c4e858ac6ddd16b5c15ccbef0ab9bf4c728eb7bbe92bf5cec041a6e4485d48ef0ba9d3ee37b2a2c48701031c533
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD54510ad85bc2ed250660b93959ee7afaf
SHA1b696b8cce98c3aa156844a9af620f8319aabf9d7
SHA25683c5be5bfd48f5a3707d9b93d3239bd07cb14811e0c2d0586e83d116d6dd54cf
SHA5127d9ae3c26bfc31f79af16bb8c5047b0ccc8829df35dde64fffa547bc12f242ea674b0b925fd81d0fa279ce60459f4a5981b373dffd9db5ef9c64cb9df5e815de
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD5e1e0c080d613629b33047e09a2a2e1bd
SHA1f9677c35d0547d125d8ab48a34f67e338d13607f
SHA25672966abd70a609c44183511360d70730e9ed8d4c8ec73d9c1adc2318c2fe3454
SHA51298316f145a04da0f3ddbdbc6613c377e5535d4ee2a6a886698fba6adff37b89a60f7651dfb9e79c297e091cc8ee0751cc24fb30ee198252af5ece2dd292cddf8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\datareporting\glean\pending_pings\11b1bd68-b249-470c-8069-c8cdb656a5ed
Filesize733B
MD502beec883541c7a56e4d71b35858396e
SHA13f53db9f07286d96f106a85e062fc40b10f309ba
SHA2567979f09240d97e61de2432cc8dcc16a200de5a479660168ff9016bdaa3092820
SHA51208921cf7c8ef9c02534bbfc0f0033fdea5e7a72e825a2af7a1a6a85fbbe28f3cca894729798b7d4ddd05831cb48b99abc3b573c7ee32b3cf9f77cf773ed3ca10
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5fcdb89c3ec2eeb752de2c28a3ff82907
SHA15b5107336a18ad5a025806b32c74782b812a1b1b
SHA256eb8194ef0ccb3c78057cadaee3b41b4928e97778ff04f10667012040c8102220
SHA51231d5b747ef58af94668c176743abce2e9c1db2bcf50c3a31ad698dcf29e26df9ab120f6569874946229cd91be000ef3256b171e46f7451e69a1ac5eccfb8395a
-
Filesize
7KB
MD5053b138e5e9f24f512caf1a418e9d89a
SHA15a5378f5acc1e17390595da662a4e40f30b9a608
SHA256e2a7a83a45bef2fccda3cd8020c3108c181bbf2df2282949fdbafdd5ea5c72b0
SHA5129125ea90d96ae005a7bae382e012a102ebfb4fc46d668f7bea6c3c44c6a5fec047241910d1f9eef958d50f59d652a5e93bdcc2f3fe918936a12fd1ea39701686
-
Filesize
7KB
MD57f136e5fd7b6cb5096294610b4c9efe0
SHA1c3a0525e0ca558d927dec3d6037edef1d032ce30
SHA256abebe88f085270f5204680822422c0d433916927cf090a3a3700ee84c3ab6931
SHA5124813c3a511ccc42db18962b60be516b4ad11cb7f5f549952aaed81126b7bc156395ebad6bdb1abb7d2b9d6ad47344024780c60f08ff75f313c0910b1b537ef43
-
Filesize
6KB
MD5e02bfb6c8db3668131a7b5ee18fbaef9
SHA1d6cc713ca23996464806f9972edc8a7d63a3402b
SHA25672c8c22c6334199dc1b262a523425ffae6942f9189d000560079f10c57d3ccee
SHA512a97aaef7836c3b138bea430735223f7fcd9e8f0b95e9daef01e5e963ee5ea950cb9543ee69d643900261f65918b006b8cda5b7efcba29867a5b3e124ed86a8c7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5930862a50bebb3e2abb33207da4d9fb8
SHA168939d76db61a083d7dd0e82085f16f99c3d80ca
SHA256a79a6e0d7e5a75173fbe9f797f1538a284247ceac941c5ec57a2b87e62ca6b90
SHA5128971afce769cdcdb1fd083888e9ecf03c1373e75b5fe1d090fc8abf4098999b53abf1820a3f6a4ff1cfe81eec6374590bf91d6d92fbd2e5d161fab2d6debe07a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\n3lsnn48.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD5bece0acf9d7f19d01c7943c54d2ad372
SHA1aef59ca4b0fe97f32db128e103bfb98aee3b5e29
SHA256ce40f79585195148ac86928d18da80b963cc98d6feb83c1c2e75e8b6d6ef39f8
SHA512105fb01521fca054766d1d1e46cf3bf177b8bab44800f7bbad9a84f388af32e745474b3cc4f70c1fd779b4e7bcf0912502860092e1824f7ba4b52c612ba5a70b
-
Filesize
3.0MB
MD5071fd9342e197ab323e93e0395fadbd0
SHA123bac802089af599de74f3f43c82319bad647a53
SHA2564b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
SHA512abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a