Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 01:15
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
04a9756bf8284415956505d7613bc2fc
-
SHA1
f804bdff226e17789e3f29cb57feebbb4066a678
-
SHA256
37fddb481b298dfa869ceb93f2887baa143da1698b87ff0dc896a477569e1eda
-
SHA512
08f69dc7c3071778061782a2cf395f060ee624e078aad713e1c82860738f3711c9e1c99df14a5b301282014cb294720e940325242f46e683f0bfd730f903b471
-
SSDEEP
49152:PZAjRi4ef0vGMcW8FCE6a/JzcDSs8Fcm98UXIXkJk3:xCiRGGM38F+SbFlaWk3
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 37302d3832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 37302d3832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 37302d3832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 37302d3832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 37302d3832.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 37302d3832.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3f5d440e54.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ad09960c33.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 37302d3832.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3f5d440e54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 37302d3832.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3f5d440e54.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ad09960c33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ad09960c33.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 37302d3832.exe -
Executes dropped EXE 5 IoCs
pid Process 2612 skotes.exe 2452 3f5d440e54.exe 620 ad09960c33.exe 2944 0be43e8035.exe 1864 37302d3832.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine ad09960c33.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 37302d3832.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Wine 3f5d440e54.exe -
Loads dropped DLL 8 IoCs
pid Process 2256 file.exe 2256 file.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe 2612 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 37302d3832.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 37302d3832.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\3f5d440e54.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013312001\\3f5d440e54.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\ad09960c33.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013313001\\ad09960c33.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\0be43e8035.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013314001\\0be43e8035.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\37302d3832.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013315001\\37302d3832.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000018745-76.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2256 file.exe 2612 skotes.exe 2452 3f5d440e54.exe 620 ad09960c33.exe 1864 37302d3832.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f5d440e54.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 0be43e8035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37302d3832.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 0be43e8035.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ad09960c33.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0be43e8035.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1516 taskkill.exe 2008 taskkill.exe 1268 taskkill.exe 2488 taskkill.exe 808 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2256 file.exe 2612 skotes.exe 2452 3f5d440e54.exe 620 ad09960c33.exe 2944 0be43e8035.exe 1864 37302d3832.exe 2944 0be43e8035.exe 1864 37302d3832.exe 1864 37302d3832.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1516 taskkill.exe Token: SeDebugPrivilege 2008 taskkill.exe Token: SeDebugPrivilege 1268 taskkill.exe Token: SeDebugPrivilege 2488 taskkill.exe Token: SeDebugPrivilege 808 taskkill.exe Token: SeDebugPrivilege 2484 firefox.exe Token: SeDebugPrivilege 2484 firefox.exe Token: SeDebugPrivilege 1864 37302d3832.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 2256 file.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2484 firefox.exe 2484 firefox.exe 2484 firefox.exe 2484 firefox.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2484 firefox.exe 2484 firefox.exe 2484 firefox.exe 2944 0be43e8035.exe 2944 0be43e8035.exe 2944 0be43e8035.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2256 wrote to memory of 2612 2256 file.exe 30 PID 2256 wrote to memory of 2612 2256 file.exe 30 PID 2256 wrote to memory of 2612 2256 file.exe 30 PID 2256 wrote to memory of 2612 2256 file.exe 30 PID 2612 wrote to memory of 2452 2612 skotes.exe 32 PID 2612 wrote to memory of 2452 2612 skotes.exe 32 PID 2612 wrote to memory of 2452 2612 skotes.exe 32 PID 2612 wrote to memory of 2452 2612 skotes.exe 32 PID 2612 wrote to memory of 620 2612 skotes.exe 34 PID 2612 wrote to memory of 620 2612 skotes.exe 34 PID 2612 wrote to memory of 620 2612 skotes.exe 34 PID 2612 wrote to memory of 620 2612 skotes.exe 34 PID 2612 wrote to memory of 2944 2612 skotes.exe 35 PID 2612 wrote to memory of 2944 2612 skotes.exe 35 PID 2612 wrote to memory of 2944 2612 skotes.exe 35 PID 2612 wrote to memory of 2944 2612 skotes.exe 35 PID 2944 wrote to memory of 1516 2944 0be43e8035.exe 36 PID 2944 wrote to memory of 1516 2944 0be43e8035.exe 36 PID 2944 wrote to memory of 1516 2944 0be43e8035.exe 36 PID 2944 wrote to memory of 1516 2944 0be43e8035.exe 36 PID 2944 wrote to memory of 2008 2944 0be43e8035.exe 38 PID 2944 wrote to memory of 2008 2944 0be43e8035.exe 38 PID 2944 wrote to memory of 2008 2944 0be43e8035.exe 38 PID 2944 wrote to memory of 2008 2944 0be43e8035.exe 38 PID 2944 wrote to memory of 1268 2944 0be43e8035.exe 40 PID 2944 wrote to memory of 1268 2944 0be43e8035.exe 40 PID 2944 wrote to memory of 1268 2944 0be43e8035.exe 40 PID 2944 wrote to memory of 1268 2944 0be43e8035.exe 40 PID 2944 wrote to memory of 2488 2944 0be43e8035.exe 42 PID 2944 wrote to memory of 2488 2944 0be43e8035.exe 42 PID 2944 wrote to memory of 2488 2944 0be43e8035.exe 42 PID 2944 wrote to memory of 2488 2944 0be43e8035.exe 42 PID 2944 wrote to memory of 808 2944 0be43e8035.exe 44 PID 2944 wrote to memory of 808 2944 0be43e8035.exe 44 PID 2944 wrote to memory of 808 2944 0be43e8035.exe 44 PID 2944 wrote to memory of 808 2944 0be43e8035.exe 44 PID 2944 wrote to memory of 2364 2944 0be43e8035.exe 46 PID 2944 wrote to memory of 2364 2944 0be43e8035.exe 46 PID 2944 wrote to memory of 2364 2944 0be43e8035.exe 46 PID 2944 wrote to memory of 2364 2944 0be43e8035.exe 46 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2364 wrote to memory of 2484 2364 firefox.exe 47 PID 2484 wrote to memory of 1088 2484 firefox.exe 48 PID 2484 wrote to memory of 1088 2484 firefox.exe 48 PID 2484 wrote to memory of 1088 2484 firefox.exe 48 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 PID 2484 wrote to memory of 2844 2484 firefox.exe 49 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\1013312001\3f5d440e54.exe"C:\Users\Admin\AppData\Local\Temp\1013312001\3f5d440e54.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\1013313001\ad09960c33.exe"C:\Users\Admin\AppData\Local\Temp\1013313001\ad09960c33.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:620
-
-
C:\Users\Admin\AppData\Local\Temp\1013314001\0be43e8035.exe"C:\Users\Admin\AppData\Local\Temp\1013314001\0be43e8035.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:808
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.0.123185388\466970715" -parentBuildID 20221007134813 -prefsHandle 1224 -prefMapHandle 1216 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a5c88ba1-f075-4ba1-86fc-be332dd00ca5} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 1308 126d4e58 gpu6⤵PID:1088
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.1.462613776\1934428686" -parentBuildID 20221007134813 -prefsHandle 1492 -prefMapHandle 1488 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d8d2733c-b822-460e-9c2b-714f9891d0d5} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 1504 d71858 socket6⤵PID:2844
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.2.884092926\1766973499" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2092 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e3c67327-e164-4ae0-aa7d-73842862f9ee} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 2108 1a5b7c58 tab6⤵PID:2472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.3.282709766\102114599" -childID 2 -isForBrowser -prefsHandle 2336 -prefMapHandle 580 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7260142d-1eb2-4d51-b677-b70302f18591} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 2704 d64858 tab6⤵PID:880
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.4.1050511163\640769356" -childID 3 -isForBrowser -prefsHandle 3632 -prefMapHandle 3052 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d14c0730-00e6-4a8e-8260-fb0e7ed930f7} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 3616 1ee1ce58 tab6⤵PID:1472
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.5.1954620812\176993170" -childID 4 -isForBrowser -prefsHandle 3748 -prefMapHandle 3752 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {965a2085-f94a-45c6-bca2-aaf20265bff4} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 3740 1f1f2358 tab6⤵PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2484.6.134083609\1551592601" -childID 5 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {bcfb7baa-4058-4504-821a-a63eb84582f1} 2484 "\\.\pipe\gecko-crash-server-pipe.2484" 3924 1f1f3b58 tab6⤵PID:2036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013315001\37302d3832.exe"C:\Users\Admin\AppData\Local\Temp\1013315001\37302d3832.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1864
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\activity-stream.discovery_stream.json.tmp
Filesize31KB
MD5a0dd396f0cb640e3a6e19fade46c2860
SHA1f4be7e193cd831c612479ccb5eb6cc4380a02cfd
SHA2565bc1a5c2ccdb358a49adb8882fa0c351cfbea0c4cae0b9ca153f9a95add8b24b
SHA512e457e62dfc5a5e0adc5cae934650d8b8f12f13d9ea39f09f45982efcaabfbdf7ba9ca181b8f5761ca06c8199e836221dfae197e1af5aaff26d80479a1a14e5f0
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bhg31lui.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD53527f0973c172700cef62dc00ed3ad3f
SHA188d82f8e7f5cd7a744fea7053f715552989558a1
SHA256d4dc450a2b24d254836c500666d5fc989340560805902f6eeac44e58277d88b0
SHA512d01544d74d18cd9acc217c3ad997fa07018e33ce5aa641c5354b2665deb8f78c27981817c56fa81cee1602c3eaf702aadee17a3c61c2c6dbd60e1b5a909b81da
-
Filesize
1.7MB
MD525663f093ebd742e906f2ea9731d1d40
SHA1c1704d6a226e74989aa7e488874d8c183f8c50d9
SHA256fee071d41f0357fcd54df7592d7d872f6627daaa111fc44ae34b73681f6fccdb
SHA512bfe45cd09c18b174144ee3691d12804b9592977e0095f4b1a29b3c63575ddc058dcd1d6531400b6f1be0462e1f7d1bc97d285d9fb9c683c93349f1b011f5382f
-
Filesize
950KB
MD53470fb4923d80e927ac919d827d968ea
SHA132d552ec09683f080e775272b013c8346d08a9d7
SHA256e8666867c64f048fe2ea476c2774659bff5be9873deda253169666133f9b6361
SHA512c52303a76aea01bb5b60fbe8c2ed43814fdf33bc76ef3d2bd4b95f96ba4dab357e87513b720198320cfd115b69ad8797661f0a45e4f194ed5fee5fd508703c73
-
Filesize
2.6MB
MD5c7a53078643940f2e89441d638636d4c
SHA1f485dc85c659944bf02564a7913e8eb6c45d8e25
SHA25606f1a292c6f6e3f9517235755c0e0ceee28e6fa00b58d87ba6ed23c9eafc88eb
SHA51269318821e15c793bc26051deff2d27ef89512a6131831765f5a75a2fc324cb4895b477d645468a08ebe15304792ed46f2084d078830b13bcc91f7293ba5023b0
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\db\data.safe.bin
Filesize9KB
MD510a3e1827b9d45fa5ab9fda115be28dc
SHA1c109e31e7a1b664d9fd80963ae6b855be5306ad5
SHA256384517554bd05951b83c807afd7d165145589ad0df9aa951eaa6cf71ac1a1ff3
SHA51223622527cdfb18327ed155f8b93325fb9c7c6eeb18c06eb3c5e1bc946291803b17cacbe588743fd0bc52a5089071ff178aa808968e1d345c8cda7c3a15f3995d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\datareporting\glean\pending_pings\85980479-7a42-428f-baff-95ee7db43c4c
Filesize733B
MD5d083a318b9009ee30ccec4e157b459e0
SHA1e4657854e5274e00f26069da031ef20d4a7e3fb7
SHA256a24ae324e1b73f7f6414338cea9e33d6826216790764eb8207746877081bf91e
SHA512f5d2037b683b32f0bac7b2690834c2b8ebba5d0a1088df84ef3cc27e86d0dda0055bb1295a1f209e86709a8a21f2eff0f3244e09b32cb3552efeceaff66724ed
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
6KB
MD5917603988fa8c5aac3f1af05536bd4f5
SHA14c1afc1540961c50f229470f601b2e857223eddb
SHA256d6e1a3c795cdfb9618e4d21f8937d6b4ef8ae3bc530eaa6224b077bf12504695
SHA5127ebd4c19d1aed0550836ee70603ad0ab7a587cba7c388aa1645324c54e908c5ea83d486d887ecbd5ad0eb2caac7f89ebf60eabbf9222deea397b6da05e365621
-
Filesize
7KB
MD5330b7cc68e53ca690494e488b3863240
SHA12dc5eaeff78d8aabf372630a29426cbdbab0dd2c
SHA25697e386fcb9ed8b3da20c137b1ed616efcfc6a14f9df4a3b62844cee0cd49f5a4
SHA512a6c3233e4581106e5d1140df409513cf294c5b90224da9fe628579ab11e9c046599ca57e44b06d75a663d4a9e036302b5b2b8b6cde6fdc4cc39bbd8221dc91fb
-
Filesize
7KB
MD564394f8c82229f7f1bcb27feee51b2f2
SHA1f91e5a64cef45f5074f2d171b67fe6a733dd6167
SHA256edbd63144c0399ec64ba7f2f8c763840ef1e5e88bf4a0aba6a306688ec2681de
SHA51235be601d5ed12ef1d51a105b23a7c2a3d1e5603d103951594935e782fcc59ed81165be61ec37d97d965ddd7c5f71a21015753b39f729923fc0008b89b7629eb0
-
Filesize
6KB
MD5e94c7eab30c7a9ebba36fb42b47c07a3
SHA1f411515b14f215d7117c2520736a2b2dae2df423
SHA2562a1ab494fa7219f7b32be5874a229659f5ee44e5f6ba9e449a60048ad9e0ab27
SHA512babd9aada91eea867b3a8cc0a0b0465ee46c4b29899bfa7cb24ff2a6989b5a202dc515a783ef18d03a8486469255b6d77e7c25c442045216f7b300e38686af5e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bhg31lui.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD57d6b68b803b357d8a944392219797ad3
SHA19827a81c918ef91da34a8ddbdd34582a51b46ffd
SHA256c49978fe3d3cc05fd0e7f5501817e0098ee1bf679b8d5a1b967fde155412fcf1
SHA51200b5e76bc4bae8ec95bafde8dd7dce55f987e161005dcc28d8efbe19ea6b92c987184d5dee6f68176d411c51df0746420d5c45b57eb0d2cee6cd58f4067a7c15
-
Filesize
3.1MB
MD504a9756bf8284415956505d7613bc2fc
SHA1f804bdff226e17789e3f29cb57feebbb4066a678
SHA25637fddb481b298dfa869ceb93f2887baa143da1698b87ff0dc896a477569e1eda
SHA51208f69dc7c3071778061782a2cf395f060ee624e078aad713e1c82860738f3711c9e1c99df14a5b301282014cb294720e940325242f46e683f0bfd730f903b471