Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
3.0MB
-
MD5
a8696aeff1289aa6baff606acc8054c2
-
SHA1
c2bddd5a199fc8b392f6577f6ecbc32a27ceb4b3
-
SHA256
6dbb408d51e8c5d71b3130dcc293116d41a20b19e6cb11a79ce5ae834ef1a369
-
SHA512
de04f0da8cffbe76060e1c7a5cb8b59db486e30ab8f3fceb20711141282573e3dbc4cfd82c6d28ded47549dcb4cbadce62ada358fd3fe6d2e34e30da4ef718d9
-
SSDEEP
49152:QOZwqVyDL6FFF/5ysXPskPiilxv7uwb+cSyW:QOZw8y/6F7/0ePskPJlxv7Z+cSB
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2ff13afc28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2ff13afc28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2ff13afc28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2ff13afc28.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2ff13afc28.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2ff13afc28.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 43a496028e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f024166e45.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2ff13afc28.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ IJJJKEGHJK.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 1072 chrome.exe 4024 chrome.exe 5360 msedge.exe 4428 msedge.exe 4904 chrome.exe 2516 chrome.exe 4064 msedge.exe 908 msedge.exe 3640 msedge.exe -
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 43a496028e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2ff13afc28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 43a496028e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f024166e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2ff13afc28.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion IJJJKEGHJK.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f024166e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion IJJJKEGHJK.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation file.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation f024166e45.exe -
Executes dropped EXE 8 IoCs
pid Process 1572 skotes.exe 5012 43a496028e.exe 5108 f024166e45.exe 2696 51a506d7a0.exe 1028 2ff13afc28.exe 5568 IJJJKEGHJK.exe 808 skotes.exe 2372 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 2ff13afc28.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine IJJJKEGHJK.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine 43a496028e.exe Key opened \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Wine f024166e45.exe -
Loads dropped DLL 2 IoCs
pid Process 5108 f024166e45.exe 5108 f024166e45.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2ff13afc28.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2ff13afc28.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\43a496028e.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013136001\\43a496028e.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\f024166e45.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013137001\\f024166e45.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\51a506d7a0.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013138001\\51a506d7a0.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2ff13afc28.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013139001\\2ff13afc28.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023c95-84.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3964 file.exe 1572 skotes.exe 5012 43a496028e.exe 5108 f024166e45.exe 1028 2ff13afc28.exe 5568 IJJJKEGHJK.exe 808 skotes.exe 2372 skotes.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\debug.log chrome.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\debug.log chrome.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4108 5012 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 51a506d7a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 51a506d7a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43a496028e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f024166e45.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ff13afc28.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IJJJKEGHJK.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 51a506d7a0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 13 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString f024166e45.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 f024166e45.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 808 taskkill.exe 3428 taskkill.exe 3592 taskkill.exe 2492 taskkill.exe 2396 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 3964 file.exe 3964 file.exe 1572 skotes.exe 1572 skotes.exe 5012 43a496028e.exe 5012 43a496028e.exe 5108 f024166e45.exe 5108 f024166e45.exe 5108 f024166e45.exe 5108 f024166e45.exe 5108 f024166e45.exe 5108 f024166e45.exe 4904 chrome.exe 4904 chrome.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 1028 2ff13afc28.exe 1028 2ff13afc28.exe 5108 f024166e45.exe 5108 f024166e45.exe 5848 msedge.exe 5848 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5360 msedge.exe 5360 msedge.exe 1028 2ff13afc28.exe 1028 2ff13afc28.exe 1028 2ff13afc28.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5464 msedge.exe 5108 f024166e45.exe 5108 f024166e45.exe 5108 f024166e45.exe 5108 f024166e45.exe 5568 IJJJKEGHJK.exe 5568 IJJJKEGHJK.exe 808 skotes.exe 808 skotes.exe 2372 skotes.exe 2372 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeDebugPrivilege 3592 taskkill.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeShutdownPrivilege 4904 chrome.exe Token: SeCreatePagefilePrivilege 4904 chrome.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 2396 taskkill.exe Token: SeDebugPrivilege 808 taskkill.exe Token: SeDebugPrivilege 3428 taskkill.exe Token: SeDebugPrivilege 1356 firefox.exe Token: SeDebugPrivilege 1356 firefox.exe Token: SeDebugPrivilege 1028 2ff13afc28.exe Token: SeDebugPrivilege 1356 firefox.exe Token: SeDebugPrivilege 1356 firefox.exe Token: SeDebugPrivilege 1356 firefox.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3964 file.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 4904 chrome.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 2696 51a506d7a0.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe 5360 msedge.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 2696 51a506d7a0.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 1356 firefox.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe 2696 51a506d7a0.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1356 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1572 3964 file.exe 82 PID 3964 wrote to memory of 1572 3964 file.exe 82 PID 3964 wrote to memory of 1572 3964 file.exe 82 PID 1572 wrote to memory of 5012 1572 skotes.exe 83 PID 1572 wrote to memory of 5012 1572 skotes.exe 83 PID 1572 wrote to memory of 5012 1572 skotes.exe 83 PID 1572 wrote to memory of 5108 1572 skotes.exe 85 PID 1572 wrote to memory of 5108 1572 skotes.exe 85 PID 1572 wrote to memory of 5108 1572 skotes.exe 85 PID 5108 wrote to memory of 4904 5108 f024166e45.exe 91 PID 5108 wrote to memory of 4904 5108 f024166e45.exe 91 PID 4904 wrote to memory of 3204 4904 chrome.exe 92 PID 4904 wrote to memory of 3204 4904 chrome.exe 92 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 3728 4904 chrome.exe 94 PID 4904 wrote to memory of 1204 4904 chrome.exe 95 PID 4904 wrote to memory of 1204 4904 chrome.exe 95 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 PID 4904 wrote to memory of 1372 4904 chrome.exe 96 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\1013136001\43a496028e.exe"C:\Users\Admin\AppData\Local\Temp\1013136001\43a496028e.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5012 -s 15124⤵
- Program crash
PID:4108
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013137001\f024166e45.exe"C:\Users\Admin\AppData\Local\Temp\1013137001\f024166e45.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffe5721cc40,0x7ffe5721cc4c,0x7ffe5721cc585⤵PID:3204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1888,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=1884 /prefetch:25⤵PID:3728
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=2140,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2172 /prefetch:35⤵PID:1204
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2224,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=2432 /prefetch:85⤵PID:1372
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3184 /prefetch:15⤵
- Uses browser remote debugging
PID:1072
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3192,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=3360 /prefetch:15⤵
- Uses browser remote debugging
PID:4024
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4488,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4504 /prefetch:15⤵
- Uses browser remote debugging
PID:2516
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4780,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4668 /prefetch:85⤵PID:2888
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4920,i,8582897232929024364,18090338292370475780,262144 --variations-seed-version=20241006-180150.222000 --mojo-platform-channel-handle=4932 /prefetch:85⤵
- Drops file in Program Files directory
PID:4232
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:5360 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffe542e46f8,0x7ffe542e4708,0x7ffe542e47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:5464
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2136 /prefetch:25⤵PID:5844
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2408 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:5848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2796 /prefetch:85⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3380 /prefetch:15⤵
- Uses browser remote debugging
PID:908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3244 /prefetch:15⤵
- Uses browser remote debugging
PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4808 /prefetch:15⤵
- Uses browser remote debugging
PID:3640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3828 /prefetch:15⤵
- Uses browser remote debugging
PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2128,16017186948290592022,16234373968883000680,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2168 /prefetch:25⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c start "" "C:\Users\Admin\Documents\IJJJKEGHJK.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\Documents\IJJJKEGHJK.exe"C:\Users\Admin\Documents\IJJJKEGHJK.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5568
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013138001\51a506d7a0.exe"C:\Users\Admin\AppData\Local\Temp\1013138001\51a506d7a0.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2696 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:428
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2032 -parentBuildID 20240401114208 -prefsHandle 1960 -prefMapHandle 1952 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {838c3f96-9731-4aae-a66f-956c2413cee7} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" gpu6⤵PID:4048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2468 -parentBuildID 20240401114208 -prefsHandle 2460 -prefMapHandle 2456 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cdd89d4d-edf9-4cda-8000-cbbe9c9de6b0} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" socket6⤵PID:3844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3104 -childID 1 -isForBrowser -prefsHandle 3036 -prefMapHandle 3128 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a6355eb6-75d9-4a27-b15a-0edc8212b25b} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" tab6⤵PID:2220
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3736 -childID 2 -isForBrowser -prefsHandle 3728 -prefMapHandle 3140 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9c4409c5-419f-4f69-8557-4a59713413d9} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" tab6⤵PID:2688
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4784 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4700 -prefMapHandle 4808 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc6cd968-5494-4d4d-a55c-e1af5ed7472f} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" utility6⤵
- Checks processor information in registry
PID:5288
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5352 -childID 3 -isForBrowser -prefsHandle 5272 -prefMapHandle 5344 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e9938476-6994-4dd8-81e8-9564a3776ce8} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" tab6⤵PID:6048
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5528 -childID 4 -isForBrowser -prefsHandle 5444 -prefMapHandle 5448 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {55caa9c4-002c-408c-8485-f0d6c7643c07} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" tab6⤵PID:6060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5652 -childID 5 -isForBrowser -prefsHandle 5660 -prefMapHandle 5664 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 908 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6a849351-ea43-427c-a53e-b0d4172c8bda} 1356 "\\.\pipe\gecko-crash-server-pipe.1356" tab6⤵PID:6076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013139001\2ff13afc28.exe"C:\Users\Admin\AppData\Local\Temp\1013139001\2ff13afc28.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5012 -ip 50121⤵PID:2900
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 5012 -ip 50121⤵PID:3548
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:808
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2372
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
3Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593KB
MD5c8fd9be83bc728cc04beffafc2907fe9
SHA195ab9f701e0024cedfbd312bcfe4e726744c4f2e
SHA256ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a
SHA512fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040
-
Filesize
2.0MB
MD51cc453cdf74f31e4d913ff9c10acdde2
SHA16e85eae544d6e965f15fa5c39700fa7202f3aafe
SHA256ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5
SHA512dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports\ab67f10e-5cb0-47ba-87ee-0226498b6d15.dmp
Filesize826KB
MD5ac6d83f95b3a03a0f8b0497b71cc6be0
SHA1a9b2d135dcd393e73ac93c829d35e164d00fe0b8
SHA25679e5549c1d33fbf77ccfc88f1fd264f1d36264ef512a74bd8ce521c54000e515
SHA512c8da9ecca149d19e7b42610ba20c9ebb2332892da54ed297ad142637c4357475af086e2922d8403e08f8fa8632bbb79b24c45ea16c5cafcffa7720af3c1e8ae4
-
Filesize
152B
MD536988ca14952e1848e81a959880ea217
SHA1a0482ef725657760502c2d1a5abe0bb37aebaadb
SHA256d7e96088b37cec1bde202ae8ec2d2f3c3aafc368b6ebd91b3e2985846facf2e6
SHA512d04b2f5afec92eb3d9f9cdc148a3eddd1b615e0dfb270566a7969576f50881d1f8572bccb8b9fd7993724bdfe36fc7633a33381d43e0b96c4e9bbd53fc010173
-
Filesize
152B
MD5fab8d8d865e33fe195732aa7dcb91c30
SHA12637e832f38acc70af3e511f5eba80fbd7461f2c
SHA2561b034ffe38e534e2b7a21be7c1f207ff84a1d5f3893207d0b4bb1a509b4185ea
SHA51239a3d43ef7e28fea2cb247a5d09576a4904a43680db8c32139f22a03d80f6ede98708a2452f3f82232b868501340f79c0b3f810f597bcaf5267c3ccfb1704b43
-
Filesize
152B
MD50bb49fa1461208bd817a9ddf701c63cd
SHA1119272d833bc4bac831516d19c4f716b25bbb63d
SHA2565d7923321cd862d43df36c426bd6cdb38960e077c0212d17aaefcafa647bf99e
SHA512e1c252f3e58f5d7fc4227340bafef791334031615d8b55374fdad7696228601be0feb97a5e1cf8402d6048545373ffa8a56aa81d05114438df793271befa1724
-
Filesize
5KB
MD54d83403e4870c28f0e822268071cc73f
SHA1342fa5d8f24c37d998a9ca58252d215a86799b13
SHA256239f879fa9d212b3f6ab6f6aa788319283d1254d115bcb503996cc6ea7aa3c8e
SHA512d6a71577a7930ffa136e23e62bca9fbe224d849b32faeecd6dc5149b65d8929d429f910bfa2ab06364a65c2c13d5529cd363a4ecef527ab396a552832b5dcb01
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD554a6ec765f3127ad44ee221c88d19c94
SHA12078876b0b4e8a9b3f413f44a52f72a6ad4c063b
SHA2562cbc2a277a1b8b37e695887026035601da3ff1f3160c96a0a1341482bc0f4b16
SHA51212542ade132528e41b02e2f5d27ae6750224d9f8fdbe6e064cc217e62c403f4e1ca627a4b53f7bec6f89dc8212ccc6351e6802c71c4f30685672f65ad9fdbdcd
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5c75351b9bf4fc9e6ead73300a46986b3
SHA168dc656395a3b80d8f8915769cbc7d9335f7cb0e
SHA256ef218bf8776bccdad336d41ede63821319d310b2ed5bade641f81590ca4ec253
SHA512f4f77d56f07dac3c13b06305fbd215ff3e059631bfa9193817c053d30095a447809d0022d46fb70b95c12d91ebe4327bf482e28b53e682972cbc98b834c58aaf
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5969a46b03de313d13c7f77c79582fc5d
SHA10f07a002b8a2b559f5db13bd123bfd8eedcbe4e3
SHA256c6737d2bddb24641bc55423c67f4f78b520647b1a88bfb8f608d8507bfbd0c72
SHA512f3111b7fed18cae024c6e58cc6715678bb8d7a3f37a7d38f95a6617678e30550cb952e92ec4bb80728fd3a2d04a6f35f03af43a0c1f976217f242f1a7ab8df96
-
Filesize
1.7MB
MD5e7fda4aa081906842a27ed7e43ff0e83
SHA1cd52719de9cdca817d4394eb42c36d0f2dad6e22
SHA2564376db8c7a2122128282d8febaabbad83c8ab29dc500e7ee0603b3b1b80d9d80
SHA5126678e3471542e8c4acab026b144e4a932db50184ec49f5a0cf2fc4d7de8236efc0a92a267fbff1f4032dedc4daf480af61de304ba805766c1837a8d6acc74a09
-
Filesize
942KB
MD5dc03cb4cc65c92050c5026e5b8dfd926
SHA1ef4e40cca4cd6c15c717e775be8bc5be003120c1
SHA256f818f47ee041a850621e1be9c9e80490b078276378d17e85bcae1aa2f34fa6a9
SHA512c30f7fdc259e99f9495d77b771b0eb9a782eda0ebf53c8a824d46142f504a60ed444f53cf0b35b0d886897d4609768f3bee7590024beece7bca1798465d34478
-
Filesize
2.7MB
MD5dcb47199eb24085346117456ffb41add
SHA14d04c6dca3e9c54b2b27d98456b365c100042dab
SHA256525310a7b3c077be581bff762d4620c3ffa3b6afb8f089f6a887c49640d82a4b
SHA512505ff081b8bb007a5016a73b4c60c9b755c8d58588f9c1d0b37b3d1384ed7782869591bd36659ad9fb4d35d53ac514d90753c35acdef8f89eb97f509aa06cf25
-
Filesize
3.0MB
MD5a8696aeff1289aa6baff606acc8054c2
SHA1c2bddd5a199fc8b392f6577f6ecbc32a27ceb4b3
SHA2566dbb408d51e8c5d71b3130dcc293116d41a20b19e6cb11a79ce5ae834ef1a369
SHA512de04f0da8cffbe76060e1c7a5cb8b59db486e30ab8f3fceb20711141282573e3dbc4cfd82c6d28ded47549dcb4cbadce62ada358fd3fe6d2e34e30da4ef718d9
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\AlternateServices.bin
Filesize8KB
MD5b3d0779d021ebd0ee50fa189c4e1eae7
SHA120be17bf85dff7486805ff6039ac3d83b0ac3494
SHA256270a7556a5f41d02d58ae90adb1e30f3bc28cf7c5352e357ee12171f934593cb
SHA512bbff9e90189c64acbfea6b05e27120c1f3a9118116a2c1b9de1e4c971774972215541fa606bd85a22b65b5339e1ca9ec398917aa55ce3ea61088d827bb554988
-
Filesize
256KB
MD5a47135e87e1ab34ba2f428041cfb4841
SHA1703ed5556f268a57330af30c3edacdd910d5fc1f
SHA2563967b749822c3a82f51152cedf77014d2c28c70e898577d36e57b4a1d1ac1441
SHA512ca82287c563f48448a65069aba4ec37ecd869f401d6013cf2a404d91bd588975b0185888ec634b1e62f30838063939e01529377f599b55c18265bab9a84ccb11
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD516639fd5d744141f17bed14028bdbfe8
SHA1b454f31307d61158c75b0576ab9d27322ad72c85
SHA2562b57e07f37664e1b63e649f48561bf3992e605088b7d81436c69887e1201d8f2
SHA5122327a99ec90406dcbd4053b7f3c79a59ec0b02ea49cf95c8d394971b119b98d75a9f5f9a4b5eb8fe6e8d673f77eb6928a16996de786b1e91bbdfb23241f60469
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5eceb287d41fc8712cba762e146b42a07
SHA14dd2a975ae1ca1cce6c5658f1284447874efda38
SHA256cf82c932864018489c871c43ad64e0d778d6ab5c6d0681a7e727924a69ac50c0
SHA512f69f6dd4d44ea57c10b2d84dfd07397b6a2d074130c542f26c47f2648d2b2dafebcb3e702ca6b27f84a22d72568f54646d8be3b12add9f9293eba9bf8a330759
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\4b19f011-e0df-406b-83d8-45387cd0f414
Filesize25KB
MD542c98c41a183d660ea2633b059fa424d
SHA13382cecbf14128200691eee1080796a4f3a7a27f
SHA2569925e05477291f4faf4de030e1120ca744ad619c287e4144d5efe294b0abda4e
SHA512ad0eda24cea17fea6824b5d4f711fd9e9c6fba80dd8142a2b556592bc75a4d4c247b14c69ebf38eaaa1b8d2d4ac7f754b459e91d3c364a9b3d2c70dd13de68c6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\a40b9ae8-74e2-45b8-8019-e8b7895ce526
Filesize671B
MD509b4da7ebc751a2dee4837b3bc9e5148
SHA124a2160d2b4e3f5d57d94641ea94c4320324b42b
SHA25605bd81fc2003637c78b1381baa0e2ba36779452e84a863d2ccf9d00f6bf344b0
SHA51284e867367dd64c265b85f2da941a0098cfa7c55ea15462a097901c860f6195e0b51ad1ad7b6bedd301e70c173d063fcfae11a851326c3b3c9468a21e58290ac4
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\datareporting\glean\pending_pings\fa4855d3-d555-49a1-b61c-dbcbe027644e
Filesize982B
MD5713a346de7aa5752161e702db8299299
SHA1660361b65a4b3aa76bb9f674bf633b963643e142
SHA2560b89f5db232aeb962c0bc0e49a86a199d5754d9b114b5c6013e491763e3bbd1c
SHA5125997dbc8e9fcafe32eabcc6fd0ef2ee0815de3d0f925f278e4840cc94d0bd2834bc6ce67a3aab8884be407c8dae7d424cfbed34abe198950b2b25cbb6d7bd375
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\yuzka873.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
1.4MB
MD5b1adc3e04dbc65fc0311c418941d4c73
SHA15bdd6e1e8df82740b18ee39a65566eb458702192
SHA256d64e831ed99093e523e1ac0e01a89c9337990a2483c223f87ec53a69f7be6d07
SHA5127dc33a5ff4cb1dc9580a69b48a79b86973a83d8a742ad8e0104f6d5c44ac3d7e5c535381a3d78298fe6b342e004fe19cf54fcd79ba12649b602494d6db2cc25b
-
Filesize
10KB
MD525fb145e9874e291fe7a63fafde6c7fa
SHA1adea25d91c4e0b3fd9de3f9bbdd4353c35736aab
SHA256b676de93a97cfe0c895c71f099af197462e38dc2b3071c93d75e39f8a1d60503
SHA51207b478716d8ea34b32ea45f82f9310e73cf531b1940f6a058975b6bb96eea1b99066656dc1b49a300b49754ec02ec2bef6b6e2afbc0bbb9768589a9b4e5ecde0
-
Filesize
12KB
MD54c5c39d67f4daee624c1782ee410be52
SHA1fa51a37776d946d8f8de4b52d81a074f6d290df6
SHA25642e7ef70c685f2ec6d264cfad1d663bcafdc119b2287059447eb96243ae01017
SHA51243ce4b2aa1999fe3f790e91805cd538131f82cd4107da1bba194e24b4b751043f842f4ea88e44a3d2ec675c5fd93b0641f5bc2f0d5cd7da37014685edb27186b
-
Filesize
15KB
MD55cf9b84e7e9157931a9824ee7a8d1849
SHA17b557b9822e66ea00b760c082d19f1debbcc12c4
SHA256deaf08eebcb60901e0674ed43665797904a65b869de1d5bf99f6215cc7bceb6e
SHA512ad8fdbb6410f758a8843b27f6f4f7f637d52e041fe633cd6173d915e2616c93ec3d61100155f5e663ada22d67cefdcde0532c95f95ef577f5f30c9a326742495
-
Filesize
10KB
MD58064ceebc5fd19c523c497be4280d962
SHA10cfb527c258559a0c64b1d5f8b35ba1b5e21814c
SHA25652b3e7a4dc9b5ceefc29e286099daaf990da8ee3e642b9260a0808ba6f54fbea
SHA512ec253a38942ced85c6101e563abd72df8e8cd4556841d746bbeed6b1b2e2f47a3106fc13184d729fb0c285ad711021cfae98011b342d2d3d47a6ad96dcc5f076