Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 02:08
Static task
static1
Behavioral task
behavioral1
Sample
2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe
Resource
win7-20240708-en
General
-
Target
2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe
-
Size
3.0MB
-
MD5
f918560684328ef2afdfdc8a1b30e9eb
-
SHA1
6ec9093af9bf97eb48a7be519c806540f3f9d6e9
-
SHA256
2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd
-
SHA512
2861e45a5bf7d75adc0c698b3d3df81332dafe792cf2c1112daf789cb8b929e008b85dc7163bd643d1f64764d1d6c073f50345ad263013baa825146002b578b0
-
SSDEEP
49152:Xi/iI+N5lBQ59wJ7dCb7ZT/0FUQhKaa0FeunNTDNuKl:Xi/olq59U7dCb7ZT/0/FeuN4K
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7137258c93.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ef25e85429.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7137258c93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7137258c93.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ef25e85429.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ef25e85429.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe -
Executes dropped EXE 7 IoCs
pid Process 2556 skotes.exe 4544 7137258c93.exe 2020 ef25e85429.exe 5060 bd429a9661.exe 4984 skotes.exe 444 skotes.exe 3092 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine ef25e85429.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 7137258c93.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\7137258c93.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013320001\\7137258c93.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ef25e85429.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013321001\\ef25e85429.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bd429a9661.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013322001\\bd429a9661.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023cba-67.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 2556 skotes.exe 4544 7137258c93.exe 2020 ef25e85429.exe 4984 skotes.exe 444 skotes.exe 3092 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3408 4544 WerFault.exe 87 2084 4544 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bd429a9661.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage bd429a9661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7137258c93.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language bd429a9661.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ef25e85429.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 684 taskkill.exe 736 taskkill.exe 1728 taskkill.exe 1004 taskkill.exe 1528 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 2556 skotes.exe 2556 skotes.exe 4544 7137258c93.exe 4544 7137258c93.exe 2020 ef25e85429.exe 2020 ef25e85429.exe 4984 skotes.exe 4984 skotes.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 444 skotes.exe 444 skotes.exe 3092 skotes.exe 3092 skotes.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 684 taskkill.exe Token: SeDebugPrivilege 736 taskkill.exe Token: SeDebugPrivilege 1728 taskkill.exe Token: SeDebugPrivilege 1004 taskkill.exe Token: SeDebugPrivilege 1528 taskkill.exe Token: SeDebugPrivilege 4140 firefox.exe Token: SeDebugPrivilege 4140 firefox.exe Token: SeDebugPrivilege 4140 firefox.exe Token: SeDebugPrivilege 4140 firefox.exe Token: SeDebugPrivilege 4140 firefox.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe -
Suspicious use of SendNotifyMessage 31 IoCs
pid Process 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 4140 firefox.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe 5060 bd429a9661.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4140 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3300 wrote to memory of 2556 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 82 PID 3300 wrote to memory of 2556 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 82 PID 3300 wrote to memory of 2556 3300 2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe 82 PID 2556 wrote to memory of 4544 2556 skotes.exe 87 PID 2556 wrote to memory of 4544 2556 skotes.exe 87 PID 2556 wrote to memory of 4544 2556 skotes.exe 87 PID 2556 wrote to memory of 2020 2556 skotes.exe 94 PID 2556 wrote to memory of 2020 2556 skotes.exe 94 PID 2556 wrote to memory of 2020 2556 skotes.exe 94 PID 2556 wrote to memory of 5060 2556 skotes.exe 97 PID 2556 wrote to memory of 5060 2556 skotes.exe 97 PID 2556 wrote to memory of 5060 2556 skotes.exe 97 PID 5060 wrote to memory of 684 5060 bd429a9661.exe 98 PID 5060 wrote to memory of 684 5060 bd429a9661.exe 98 PID 5060 wrote to memory of 684 5060 bd429a9661.exe 98 PID 5060 wrote to memory of 736 5060 bd429a9661.exe 101 PID 5060 wrote to memory of 736 5060 bd429a9661.exe 101 PID 5060 wrote to memory of 736 5060 bd429a9661.exe 101 PID 5060 wrote to memory of 1728 5060 bd429a9661.exe 103 PID 5060 wrote to memory of 1728 5060 bd429a9661.exe 103 PID 5060 wrote to memory of 1728 5060 bd429a9661.exe 103 PID 5060 wrote to memory of 1004 5060 bd429a9661.exe 105 PID 5060 wrote to memory of 1004 5060 bd429a9661.exe 105 PID 5060 wrote to memory of 1004 5060 bd429a9661.exe 105 PID 5060 wrote to memory of 1528 5060 bd429a9661.exe 107 PID 5060 wrote to memory of 1528 5060 bd429a9661.exe 107 PID 5060 wrote to memory of 1528 5060 bd429a9661.exe 107 PID 5060 wrote to memory of 3516 5060 bd429a9661.exe 109 PID 5060 wrote to memory of 3516 5060 bd429a9661.exe 109 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 3516 wrote to memory of 4140 3516 firefox.exe 110 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 PID 4140 wrote to memory of 3244 4140 firefox.exe 111 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe"C:\Users\Admin\AppData\Local\Temp\2d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\1013320001\7137258c93.exe"C:\Users\Admin\AppData\Local\Temp\1013320001\7137258c93.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 14764⤵
- Program crash
PID:2084
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4544 -s 14924⤵
- Program crash
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013321001\ef25e85429.exe"C:\Users\Admin\AppData\Local\Temp\1013321001\ef25e85429.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020
-
-
C:\Users\Admin\AppData\Local\Temp\1013322001\bd429a9661.exe"C:\Users\Admin\AppData\Local\Temp\1013322001\bd429a9661.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1996 -parentBuildID 20240401114208 -prefsHandle 1912 -prefMapHandle 1904 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {e1cd4d85-8743-4d3e-b702-1006d7235213} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" gpu6⤵PID:3244
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2436 -parentBuildID 20240401114208 -prefsHandle 2428 -prefMapHandle 2424 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5aac67e2-0e6e-48a8-8b2c-a1c5368c177b} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" socket6⤵PID:3296
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3236 -childID 1 -isForBrowser -prefsHandle 1448 -prefMapHandle 2856 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {37cce1bf-24b1-424b-937e-848b9f936f7e} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" tab6⤵PID:5096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3736 -childID 2 -isForBrowser -prefsHandle 3728 -prefMapHandle 2628 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {9619a83a-2443-42c3-b9ec-ce05d9ffe998} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" tab6⤵PID:2084
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4836 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4828 -prefMapHandle 4796 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {4442f773-0dac-4720-80e1-4bfd3bbf2e44} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" utility6⤵
- Checks processor information in registry
PID:5040
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5368 -childID 3 -isForBrowser -prefsHandle 5352 -prefMapHandle 5364 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {0885d41c-1dc0-418e-b6a8-3372a7047f41} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" tab6⤵PID:5672
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5500 -childID 4 -isForBrowser -prefsHandle 5508 -prefMapHandle 5512 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {7634a51d-bdb8-420d-97f9-3f7c1beb88df} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" tab6⤵PID:5684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5692 -childID 5 -isForBrowser -prefsHandle 5700 -prefMapHandle 5704 -prefsLen 27051 -prefMapSize 244658 -jsInitHandle 1308 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {59af5c08-56a2-4bad-b2cc-fda96c18c99c} 4140 "\\.\pipe\gecko-crash-server-pipe.4140" tab6⤵PID:5696
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4544 -ip 45441⤵PID:4240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 4544 -ip 45441⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4984
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:444
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3092
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\activity-stream.discovery_stream.json
Filesize27KB
MD5ed7823b44cb320a70902277de5e5b52d
SHA19613eb51b8294c1d5317a10d169df227cb0371eb
SHA256c79df550cc0c80bda13aba6dcd16835e45b293f98a824ef19b0d7ddd2f5202e7
SHA5122d525a1a9e71e2d036bdcdc057fb815b81d48ba6e058b2e2019666d0ccdbebc2bd50ef0f3e1be15a86f6827062dccb14a3003d122d19eb9729f8b22164ce111c
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD5fb4de1d9f10bd09d2a876d6c284608e7
SHA1d6c14a300d570ad7541890732c4f0d8ed1f9ccf9
SHA2560d1e2588f129af7f09b3cac6b364220f01a028f51ed7e3a97230233ec7c348fb
SHA5126a837babcacaa1157e5851747dfece73a9345629dc675dbd8091876269f24b26d986d0855983702e415abf2f69fd302f699e2f7b2bf757471cea815c3821342a
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\7fmsgkth.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.8MB
MD5718df5093b76895d927eb35fb410a4e6
SHA1091548d1b0819bb3c62d7e2487f0091740643d3c
SHA256de4b49f8652307bbf8db24c062a86d7aff0d9257393ecb8f3b2886da1b2769e1
SHA512089ce4da601f8d035fca742069990c186ff48aef05d053c4bb9cee5082f6a4c0a01be8107ea2f1869c2c7d13da1f5080fdcff6061a8faee36f4fa371a796d757
-
Filesize
1.8MB
MD5a310af2f485f81fc0bf83e5aa13b4e81
SHA1f771249201654b2681af8e98ce045232b56ddd16
SHA2562555992e8f92e47be6e695efa9ba1c605eba383cea0e0029baabd44739b008a2
SHA512e7ef90cf24c2e2c77340e97b3b43997ed3df734b3c1a5738b4e4e306c6bd617cc8eb67efaf38956fdc0b319f7dd4c451e89b60370c198c0217777095457aba98
-
Filesize
946KB
MD5b84453ce8cc72b8cbe127ad3e8170d61
SHA1d5ac67ab2bd5a8eea23ca6036cabd4c192b25e52
SHA2564da9099b6f35f8e2ecbe76890874ae7b111fea22d21c8f1b4143e891437ce083
SHA512de13c7844c192133dcdd9bde8ca377388189f3189e71d8a6f8640c0448b3fde82eb551a6ebadbbb7b8a6dda67f9978629968b955790b25be541b4aa8fc3f5ecd
-
Filesize
3.0MB
MD5f918560684328ef2afdfdc8a1b30e9eb
SHA16ec9093af9bf97eb48a7be519c806540f3f9d6e9
SHA2562d4170efe9401501e4ae84ffb262414c39f92c311054424e324bc872081227fd
SHA5122861e45a5bf7d75adc0c698b3d3df81332dafe792cf2c1112daf789cb8b929e008b85dc7163bd643d1f64764d1d6c073f50345ad263013baa825146002b578b0
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\AlternateServices.bin
Filesize10KB
MD509e34d7c1463219d249db725fc1e4578
SHA1c3760434ab2ca8768656fe3e4767518a93e55f12
SHA256bcaaf6f76373b5f00f5e2276b17a5039b023d432aa8fca76da64f334c5c87108
SHA512ed0189f5476f51e7a1eddaec2512dbe9ef618329dd17c315932c78311ddd35b02aad71089599c9985eb256078be351a94fda9c4f2ba5db3bea48c53f6d2d9c05
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize25KB
MD585506acfaa5e28d0c44f58105400a489
SHA15c7126602b68f962036297be391aa97237c8519c
SHA256408b6d91555f0acea9958d0378ae91d4576e0cdfbce7f36f33df994676631e04
SHA512375e76bc53ff1b65aa7876a61b09766ffa7485f467db9cbc6d7a73420dd4d70f6ae55aa8cd95d49c0ec962823c68b2fe76e0294139c9d049a114cc290dab25b6
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize22KB
MD59bee348c495dff31850ca5d9b1dd3a37
SHA16d86c19dea31b4eef54701aa69505136ad733f95
SHA256d9961a837bb2c042cb9477747b92c293b480cc78ed73c049f2b409f8b7a4ba36
SHA51283a7a53ffa06fb68b1bb16dc9d225e5d6272dc514a45b7470abf2efd590b78da4665e5cf7a914a9f7bebd24dbbfd70bed19df2d7c3ca8b76ef711a781c084e1c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\db\data.safe.tmp
Filesize23KB
MD5f8c0f1184f44e2a288883f94cb359532
SHA1b35c312987eb977d9f65da2b8498060166450512
SHA256e1b8f67c44abff9ebc4cb80e7b8c50873fb209cd71444f275fdd760a737e1e62
SHA512bdbbbeb3bf300d4946b211ff300e042169725728f5a7ba6037f41b9ca12dbf964ae9ed7020ee2fd7083add75da26ed9ec66e21c01148c4b6ad9a9ed0783eb783
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\a69f7c13-436b-41b1-a2ff-7ac7a00d91c5
Filesize659B
MD52b253135610dda85f14b01b2b09ab485
SHA1d15735a1eff033fbfb4ceac0e6a8aa437b3d742d
SHA2567b5299c4a49cec3c45b19e3e939857d15bcd2bfed6f029675bf22645af1df59c
SHA5128cb925735ef63cc7e109f06d93dd68e4822fa95f450d6cf02d0b1497347dc23e6f23f02af270c7d73d4e5e2e30e399692e8d552133186b84c85097719332fa4d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\datareporting\glean\pending_pings\c3e372ca-96f2-4706-9fee-a8c7984d9be4
Filesize982B
MD527a9da354876ed0a086a313bf324822d
SHA1c875ce48504d04f6657c2a24d622b0ec8efa98d8
SHA25648036e8cd5889059c024b677204b286b23bb37b37e48dfb2c9bb0616a9b2e928
SHA51265183c5dbfc8666bdab87ca824c0d403b6003233322acba4542a218cadb2988d5c5af206bb3fb1fe5489838ba96172f986a97f148adbdcc4ad000de6f2d64406
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\7fmsgkth.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
12KB
MD5012d9cf6a8f803f20333d784e7305e2b
SHA15b9419da61e8d3c5e3d9886e1abd6725da67aef9
SHA256d127df9d2bc5516fdd8dcb6236703b025df50a37842d7f4d039d5be08fd2d5af
SHA51212033adae13198c959ccc858839fe6d78f901d4d7d0a8dfa723a67f369ed5ff606f08ba58c11a8558b976653dc2abc89024e560c8c19080705dffe3b1ffc0c7f
-
Filesize
15KB
MD5849ca9523f8940450ee75d14845cf5ee
SHA144586115c6f140912d9a5ce08263d2bce962d36c
SHA256bd92fa7dd4bbc0ba601aaedaa8b1d671b7efee2aeed36a49ed8f66db5200e637
SHA512fdd3cf0a51856fc3e7198208ab492c1fd8d84edc06bd8617c0c70ba5cc0b41b453e56f069f52269b7e882d9570ea5f9b68f21796bf59cafeec22a1e52dbf5d6b
-
Filesize
10KB
MD597e366031ac99ba99e46b7cf91051cf4
SHA101034af62186b30e736351030c77af71706c644b
SHA25661773169931d7c15a44da7d15da1b886bac182664dd655ef155e1fbeaa8e43b9
SHA51296bca018b692120f861ff2e7660e8ed7d3ad89fc0c46d87058d45734a69e84e949102a9c8b7e4bca4c84ccf1d67c89f3287de68e91234db9353a2a85504904f6