Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
071fd9342e197ab323e93e0395fadbd0
-
SHA1
23bac802089af599de74f3f43c82319bad647a53
-
SHA256
4b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
-
SHA512
abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a
-
SSDEEP
49152:O7SbZvl/c4t4L2agJhXhI759UomVfm8RZsF:O7SbZvl/c4tRazd9TmVuWZsF
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 86502f9dbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 86502f9dbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 86502f9dbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 86502f9dbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 86502f9dbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 86502f9dbb.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ cf00b74464.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b8519f657d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 86502f9dbb.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion cf00b74464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion cf00b74464.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b8519f657d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b8519f657d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 86502f9dbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 86502f9dbb.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 2484 skotes.exe 1816 cf00b74464.exe 3112 b8519f657d.exe 1488 ffd76a6144.exe 1456 86502f9dbb.exe 5268 skotes.exe 5744 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 86502f9dbb.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine cf00b74464.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine b8519f657d.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 86502f9dbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 86502f9dbb.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\cf00b74464.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013060001\\cf00b74464.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\b8519f657d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013061001\\b8519f657d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ffd76a6144.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013062001\\ffd76a6144.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\86502f9dbb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013063001\\86502f9dbb.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cae-67.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4620 file.exe 2484 skotes.exe 1816 cf00b74464.exe 3112 b8519f657d.exe 1456 86502f9dbb.exe 5268 skotes.exe 5744 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3556 1816 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf00b74464.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b8519f657d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffd76a6144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86502f9dbb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language ffd76a6144.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage ffd76a6144.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 4876 taskkill.exe 3088 taskkill.exe 324 taskkill.exe 1988 taskkill.exe 4848 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 4620 file.exe 4620 file.exe 2484 skotes.exe 2484 skotes.exe 1816 cf00b74464.exe 1816 cf00b74464.exe 3112 b8519f657d.exe 3112 b8519f657d.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1456 86502f9dbb.exe 1456 86502f9dbb.exe 1456 86502f9dbb.exe 1456 86502f9dbb.exe 1456 86502f9dbb.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 5268 skotes.exe 5268 skotes.exe 5744 skotes.exe 5744 skotes.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 4876 taskkill.exe Token: SeDebugPrivilege 3088 taskkill.exe Token: SeDebugPrivilege 324 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 1456 86502f9dbb.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 2424 firefox.exe Token: SeDebugPrivilege 2424 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 4620 file.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 1488 ffd76a6144.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 1488 ffd76a6144.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 2424 firefox.exe 1488 ffd76a6144.exe 1488 ffd76a6144.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2424 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4620 wrote to memory of 2484 4620 file.exe 82 PID 4620 wrote to memory of 2484 4620 file.exe 82 PID 4620 wrote to memory of 2484 4620 file.exe 82 PID 2484 wrote to memory of 1816 2484 skotes.exe 83 PID 2484 wrote to memory of 1816 2484 skotes.exe 83 PID 2484 wrote to memory of 1816 2484 skotes.exe 83 PID 2484 wrote to memory of 3112 2484 skotes.exe 90 PID 2484 wrote to memory of 3112 2484 skotes.exe 90 PID 2484 wrote to memory of 3112 2484 skotes.exe 90 PID 2484 wrote to memory of 1488 2484 skotes.exe 92 PID 2484 wrote to memory of 1488 2484 skotes.exe 92 PID 2484 wrote to memory of 1488 2484 skotes.exe 92 PID 1488 wrote to memory of 4876 1488 ffd76a6144.exe 94 PID 1488 wrote to memory of 4876 1488 ffd76a6144.exe 94 PID 1488 wrote to memory of 4876 1488 ffd76a6144.exe 94 PID 1488 wrote to memory of 3088 1488 ffd76a6144.exe 97 PID 1488 wrote to memory of 3088 1488 ffd76a6144.exe 97 PID 1488 wrote to memory of 3088 1488 ffd76a6144.exe 97 PID 1488 wrote to memory of 324 1488 ffd76a6144.exe 99 PID 1488 wrote to memory of 324 1488 ffd76a6144.exe 99 PID 1488 wrote to memory of 324 1488 ffd76a6144.exe 99 PID 1488 wrote to memory of 1988 1488 ffd76a6144.exe 101 PID 1488 wrote to memory of 1988 1488 ffd76a6144.exe 101 PID 1488 wrote to memory of 1988 1488 ffd76a6144.exe 101 PID 1488 wrote to memory of 4848 1488 ffd76a6144.exe 103 PID 1488 wrote to memory of 4848 1488 ffd76a6144.exe 103 PID 1488 wrote to memory of 4848 1488 ffd76a6144.exe 103 PID 2484 wrote to memory of 1456 2484 skotes.exe 105 PID 2484 wrote to memory of 1456 2484 skotes.exe 105 PID 2484 wrote to memory of 1456 2484 skotes.exe 105 PID 1488 wrote to memory of 5016 1488 ffd76a6144.exe 107 PID 1488 wrote to memory of 5016 1488 ffd76a6144.exe 107 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 5016 wrote to memory of 2424 5016 firefox.exe 108 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 PID 2424 wrote to memory of 1284 2424 firefox.exe 110 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\1013060001\cf00b74464.exe"C:\Users\Admin\AppData\Local\Temp\1013060001\cf00b74464.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 14924⤵
- Program crash
PID:3556
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013061001\b8519f657d.exe"C:\Users\Admin\AppData\Local\Temp\1013061001\b8519f657d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3112
-
-
C:\Users\Admin\AppData\Local\Temp\1013062001\ffd76a6144.exe"C:\Users\Admin\AppData\Local\Temp\1013062001\ffd76a6144.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:324
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1980 -parentBuildID 20240401114208 -prefsHandle 1888 -prefMapHandle 1880 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {9da5114f-ece2-49df-8061-898419d08a0d} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" gpu6⤵PID:1284
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2464 -parentBuildID 20240401114208 -prefsHandle 2456 -prefMapHandle 2452 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1d76bd40-11d1-49ae-9ff3-63f4ec09214b} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" socket6⤵PID:868
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3248 -childID 1 -isForBrowser -prefsHandle 3272 -prefMapHandle 3268 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {28787e77-7de8-4f44-9f8a-837b0421d12c} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3996 -childID 2 -isForBrowser -prefsHandle 3988 -prefMapHandle 3984 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3e3f0bf6-a127-40a4-8b39-20f349d800fe} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:5048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1732 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4704 -prefMapHandle 4676 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0b194905-61fb-4201-8c3f-773d649a051e} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" utility6⤵
- Checks processor information in registry
PID:5364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5376 -childID 3 -isForBrowser -prefsHandle 5412 -prefMapHandle 5440 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1771bd2f-6745-4e2d-ae68-0448ef4998d7} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:4380
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5620 -childID 4 -isForBrowser -prefsHandle 5540 -prefMapHandle 5544 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e45cb2ec-69c0-480d-b160-0bcb04e942eb} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:2764
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5748 -childID 5 -isForBrowser -prefsHandle 5824 -prefMapHandle 5820 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {3654559b-8008-4ea6-844a-137f5572c21d} 2424 "\\.\pipe\gecko-crash-server-pipe.2424" tab6⤵PID:2124
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013063001\86502f9dbb.exe"C:\Users\Admin\AppData\Local\Temp\1013063001\86502f9dbb.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1816 -ip 18161⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 1816 -ip 18161⤵PID:3896
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5268
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5744
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize19KB
MD5267497cac95f2dd0aaa769cfb04f1224
SHA129c91db495fc36cc2f237f842b6a4cfc8bc3a913
SHA25698b40c5e0c2515ed0a8927afcd4acdf5294e1d3454beaeff7e7b7d90928ad55b
SHA5120c9c41a1e3a5c965ab778f2474394f2e3ed2b5a52a6c36f16b9b51de339575634c9e02c21dc53d3e4a4904fc471ca016e799621fe99366349663012b83824143
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD53f9fab24fcdd8e9d5393d07b41d359a6
SHA1a6a7fdb7b5feae84e057f26dc2bdd3028aab753d
SHA25652ae5c06b8e8bf41b8e27e11a2c7c8bb8d8de11893a49b1ce5b6014023076387
SHA5129a75e8597c16349412e03cbb4d048331217237bc1a91287ad46558b3d0b9444baee9b131921190332adc195f6251f4d587121265ff7e66e20851f08f21a316a3
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD55fb2b7580911f21bbb4796c243f64201
SHA1749b297f4236e65c1537e0d78f338a703fe5fc17
SHA256249ce266acab1c44290fc30a908803ffd4e15ebfb49a86934a6b1c7f8e87d7b9
SHA512c2fd8afe879c1a8d4b3f35a1634ed5d30447b07bbfefa3e583ebd9b2cebfcd6f97faafd72ca39930c2fa66a996742bbb489dcc8e12c15dba861866cab889ae3a
-
Filesize
1.7MB
MD5e3dfbe72de430b4043393fb8ff8e2384
SHA147fc80752fa0339680a1b3cb3d4b1ba5d0a502c5
SHA2562a78168b664e599c73fae2fb2f42c2198a7eb21453f8125e8393cde02129e101
SHA512e9b40a49f868e2c36d706b4075b538d243f9e844cb0169985c3f03fe7dd0d60aec28374a2a1ca5c473efa9237f867e371f746e752ecf75c3c1c8f56e60c4a461
-
Filesize
945KB
MD5d9084af8fc090745072e77ac91671271
SHA1ca663d52281dfc87615c0574483cac704bd4c142
SHA256c5f18adfaa14002d42a2d38b7e707adb95276c1a35647013f181ea1a3d8612c7
SHA512d2f10f8bb0f964d7c076e32b53d5bc0fbd6249ac3d03560b3fec6e028c90d86b72bd89261e5a062da19ed3e5a54db2ffdda2f8560aa29e118a186d002849006a
-
Filesize
2.7MB
MD507df0ca2efa663656921765b094f6ade
SHA1cf77c41d3b34051fb091198d4d919b4902286282
SHA256f2ed88fc61e9dcd459aef1b3bd354d28399f7e02d50fac27841eb7d6a085420d
SHA512efb6857aafe710f41137431242233d048ba88c4e858ac6ddd16b5c15ccbef0ab9bf4c728eb7bbe92bf5cec041a6e4485d48ef0ba9d3ee37b2a2c48701031c533
-
Filesize
3.0MB
MD5071fd9342e197ab323e93e0395fadbd0
SHA123bac802089af599de74f3f43c82319bad647a53
SHA2564b06b24b08b2b0a529474760b14024946d20d1c33b2ce78ea954a0b869e6d9cb
SHA512abcaabf8532249f2244e2c31727fea6060b8aadf8897a508102c10f0a432f0e221a7117336d852e34473eef66f343013de6498f8e5a7d84f2da0e9d8fe7a436a
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize10KB
MD5959b5acad7ab76f263ba93a1fb98981c
SHA1ac565a8bd686e383617b53409a431986a4c94722
SHA2568da0d46823d79ca921e039253789265fda1c62cf2c641d208608e231d419f79b
SHA5129fe19350436ab516314e80fe5f78b420d8e7a6bc05899e7f5e2a525a8f14c4d21ce8a5870c1cfe618a9e497cc5be5b577006925bafedd953b987af5304f6c79c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize21KB
MD57b9b0c8031703c9f1d7fc23c006fd0e7
SHA1c885a52965bcf2057dfed0204eabbb7ffc373cb7
SHA256befa93a0f4f5b1ce80fd919d3b0a3a0a9fe05e7388d0805113ffbd96659eb7be
SHA512c7ee6f75fb14fc2f092ca21c9e8c60e1abd82d374a985d4e60e91b4b0d3c9374f16aa0f1d677df344aacc40eac0b5e59ab0e30ba7fa8cc9210d6d776028ab779
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD5077203f4d5076256a89ca13137ef9959
SHA1cf1b1b35a6fc53e35a8d0e6f2f8f6bcc459463c8
SHA25629d142dd9bdf1afb041cfdd52109b7d8dcaeeab6138040cf27cfcaf292474085
SHA51286af04925c0c670fc432e8efc1c6d137c5ce063a6ffef9073b9bb47a7081e2ab0edb1a9fe635943f49a17af4f113fce3d030c95c2b781b5e96b0895ea384acf6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize24KB
MD56b88349afc54523603918ce43f22131e
SHA1e032a543c1e059a334f6c4aadd56772d50f53302
SHA2565879c89c36d0d02dff8a510c35456da7dc21cd984a92f787d3d45884acd2233d
SHA512a39722a13099a322e91a6eabfb19b6cab15f6630742a7af2f4634e6a266b0ff91061c763e26b831e143766e7df6f3669ddd3614faf1119c0665b5076c78c041a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD5f18d580038f058753f475eb1d8563df6
SHA19aa2f092d09c14c6ea78f28663c0d9c5db777702
SHA256ac8974dad3ebd80f5f97d92cbef81ef52cf9657620f2b6a972ea6c6ba9983ae6
SHA512271f3a186f58c33e5b959b31b1111d4bdbc0961e416e30d6f8227a05973826786af3ea97cdf210fbdbd3bb59142c0d7a52e34bf6ee10d7963ec3a6af3782a804
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\5b34455a-1b38-445e-9986-b98e95b09c13
Filesize659B
MD5a50846a7c979965219585c394723e0b2
SHA183fae5e806f5d3b0c5a75117c792af517b1e3d53
SHA256475381c7423e41948b477c0885b8c9dcc8fdec39e04672abe71bb32e8e04b8f6
SHA5120cd8c847a63b1b0108127ead62aab258e4d7720315fe9420d8a3977fa746018170a650e254f9a8299ce5f7b365a4b949edc44fbb713a1aad42bcd8c9890c97d1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\a8fb0461-9f38-4bf7-aca2-12dcef7e9860
Filesize982B
MD5e6530f34601128ea72eedfefd21aa937
SHA1dbd4984ea639114b5782339bd6fe706c1978bf47
SHA256612cd68dd23e2a28be56b15c11b85d1993781cfb2817d3aab3e07760ff82f757
SHA51295610b41e809ed6bb8b8116219251dd021c0b644b689106415cda41208477a1e0015e35dba58e7ab52e5ad2a906deec9985196dac46cd7fccecfa8686903142b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
15KB
MD51cce8afaa3cbe8bf4f435acef902cc97
SHA110c45906abc8ac89b71ca38a6d0bea173be81237
SHA256bdeff41a38df44dd29d3a06e69c5d1aa7a87eb4e9a7af17ae08be95e987609c9
SHA5126485ccf733d97e949c0ae7c52e43843a8fff767bf176100e67f8344f040301802a480349fd03653debf819091c08495e76949736d7428f2a1de65ba522a95570
-
Filesize
10KB
MD58f138e9dedfeb54da1d0dca67999d3d1
SHA138ba0592bd09f04040fb792064da82f0c574c2de
SHA2566b993f3e951cbb6d76821cac916c0b4ac2dc2126a10050f406e6f908823f4b3a
SHA5122b5b2f09724008d63a639432d6be2ca4b3b4aa719495e19a1a350a94b064c5eba73c70d1bb148b76c5c6c194e2337992803d1d3413e33929bc2235321ccc61fd
-
Filesize
10KB
MD56ad04f515c374aae4d34cce0c09c47d6
SHA1b82994256db25636021e87a72bf0efbb7dbb9a51
SHA256c365a8b4823045b250759f77901fd85f032a596a561c7730cb9a7a874902c81d
SHA512c340f42e1a4dc6859e9a1856526ec354275f68ec8655c1792e7481c44b0e3d4f98bd0b1b91ea9b7620d94e61d3a4ed2e4af540ec6ae6dbe71e7d088c613b6c29
-
Filesize
12KB
MD50552645ed9ea3173ee681d0c0252e75c
SHA1bfac02e795f61af05b62e263a8f495ca0e6d8d4a
SHA25626c0aa37eb82e6854118ecb68ffcc4cf3edb463879de11a6c99d2d6fa196d4c1
SHA512ed3282007e19bc508649d3c8b863720f77180126677497193294d887a7a55e1e2d2027eed55c488dfde2f6969d6b5eef1762789e7d2d8870c284b1473dbd815f