Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 09:09
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
31b1538dfcc40163da1a24b8a48e6c90
-
SHA1
4377e5c025672f6dca9ed52bd08ca164b89bdca2
-
SHA256
e7aa9c79350c8dab8bd903b453f3dfd899956698fb717c91ac3cab9dec75f361
-
SHA512
3eb7b3d132ccf5c52e64eac37a00b07c3ec2a3c111cdfb2d229963b31f688f204252021be233b0d967ee4bbb3b79b62182bf1ec02247753a826218910733960e
-
SSDEEP
49152:axjioF/x5ioHP05Hp5GEUjdMbmUG4XRO3QP7ShSSDIj/:E2A/a0PqTGEQdMFBXYgP7YS5j/
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" b3564cb47c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" b3564cb47c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection b3564cb47c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" b3564cb47c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" b3564cb47c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" b3564cb47c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 02b5f87448.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b3564cb47c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 7f32369043.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 7f32369043.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b3564cb47c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b3564cb47c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 7f32369043.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 02b5f87448.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 02b5f87448.exe -
Executes dropped EXE 6 IoCs
pid Process 2332 skotes.exe 1908 vdGy6gA.exe 2828 7f32369043.exe 2916 02b5f87448.exe 780 d393bbd52f.exe 1916 b3564cb47c.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine b3564cb47c.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 7f32369043.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 02b5f87448.exe -
Loads dropped DLL 14 IoCs
pid Process 816 file.exe 816 file.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 2332 skotes.exe 3192 WerFault.exe 3192 WerFault.exe 3192 WerFault.exe 3192 WerFault.exe 3192 WerFault.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features b3564cb47c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" b3564cb47c.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\7f32369043.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013388001\\7f32369043.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\02b5f87448.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013389001\\02b5f87448.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\d393bbd52f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013390001\\d393bbd52f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\b3564cb47c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013391001\\b3564cb47c.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019aff-92.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 816 file.exe 2332 skotes.exe 2828 7f32369043.exe 2916 02b5f87448.exe 1916 b3564cb47c.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3192 1908 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3564cb47c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vdGy6gA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02b5f87448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f32369043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d393bbd52f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage d393bbd52f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language d393bbd52f.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1724 taskkill.exe 2212 taskkill.exe 2508 taskkill.exe 2016 taskkill.exe 1052 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 816 file.exe 2332 skotes.exe 2828 7f32369043.exe 2916 02b5f87448.exe 780 d393bbd52f.exe 1916 b3564cb47c.exe 780 d393bbd52f.exe 1916 b3564cb47c.exe 1916 b3564cb47c.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 2212 taskkill.exe Token: SeDebugPrivilege 2508 taskkill.exe Token: SeDebugPrivilege 2016 taskkill.exe Token: SeDebugPrivilege 1052 taskkill.exe Token: SeDebugPrivilege 2784 firefox.exe Token: SeDebugPrivilege 2784 firefox.exe Token: SeDebugPrivilege 1916 b3564cb47c.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 816 file.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 2784 firefox.exe 2784 firefox.exe 2784 firefox.exe 2784 firefox.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 2784 firefox.exe 2784 firefox.exe 2784 firefox.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe 780 d393bbd52f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 816 wrote to memory of 2332 816 file.exe 31 PID 816 wrote to memory of 2332 816 file.exe 31 PID 816 wrote to memory of 2332 816 file.exe 31 PID 816 wrote to memory of 2332 816 file.exe 31 PID 2332 wrote to memory of 1908 2332 skotes.exe 33 PID 2332 wrote to memory of 1908 2332 skotes.exe 33 PID 2332 wrote to memory of 1908 2332 skotes.exe 33 PID 2332 wrote to memory of 1908 2332 skotes.exe 33 PID 2332 wrote to memory of 2828 2332 skotes.exe 34 PID 2332 wrote to memory of 2828 2332 skotes.exe 34 PID 2332 wrote to memory of 2828 2332 skotes.exe 34 PID 2332 wrote to memory of 2828 2332 skotes.exe 34 PID 2332 wrote to memory of 2916 2332 skotes.exe 36 PID 2332 wrote to memory of 2916 2332 skotes.exe 36 PID 2332 wrote to memory of 2916 2332 skotes.exe 36 PID 2332 wrote to memory of 2916 2332 skotes.exe 36 PID 2332 wrote to memory of 780 2332 skotes.exe 37 PID 2332 wrote to memory of 780 2332 skotes.exe 37 PID 2332 wrote to memory of 780 2332 skotes.exe 37 PID 2332 wrote to memory of 780 2332 skotes.exe 37 PID 780 wrote to memory of 1724 780 d393bbd52f.exe 38 PID 780 wrote to memory of 1724 780 d393bbd52f.exe 38 PID 780 wrote to memory of 1724 780 d393bbd52f.exe 38 PID 780 wrote to memory of 1724 780 d393bbd52f.exe 38 PID 780 wrote to memory of 2212 780 d393bbd52f.exe 40 PID 780 wrote to memory of 2212 780 d393bbd52f.exe 40 PID 780 wrote to memory of 2212 780 d393bbd52f.exe 40 PID 780 wrote to memory of 2212 780 d393bbd52f.exe 40 PID 780 wrote to memory of 2508 780 d393bbd52f.exe 42 PID 780 wrote to memory of 2508 780 d393bbd52f.exe 42 PID 780 wrote to memory of 2508 780 d393bbd52f.exe 42 PID 780 wrote to memory of 2508 780 d393bbd52f.exe 42 PID 780 wrote to memory of 2016 780 d393bbd52f.exe 44 PID 780 wrote to memory of 2016 780 d393bbd52f.exe 44 PID 780 wrote to memory of 2016 780 d393bbd52f.exe 44 PID 780 wrote to memory of 2016 780 d393bbd52f.exe 44 PID 780 wrote to memory of 1052 780 d393bbd52f.exe 46 PID 780 wrote to memory of 1052 780 d393bbd52f.exe 46 PID 780 wrote to memory of 1052 780 d393bbd52f.exe 46 PID 780 wrote to memory of 1052 780 d393bbd52f.exe 46 PID 780 wrote to memory of 2160 780 d393bbd52f.exe 48 PID 780 wrote to memory of 2160 780 d393bbd52f.exe 48 PID 780 wrote to memory of 2160 780 d393bbd52f.exe 48 PID 780 wrote to memory of 2160 780 d393bbd52f.exe 48 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2160 wrote to memory of 2784 2160 firefox.exe 49 PID 2784 wrote to memory of 2816 2784 firefox.exe 50 PID 2784 wrote to memory of 2816 2784 firefox.exe 50 PID 2784 wrote to memory of 2816 2784 firefox.exe 50 PID 2784 wrote to memory of 2740 2784 firefox.exe 51 PID 2784 wrote to memory of 2740 2784 firefox.exe 51 PID 2784 wrote to memory of 2740 2784 firefox.exe 51 PID 2784 wrote to memory of 2740 2784 firefox.exe 51 PID 2784 wrote to memory of 2740 2784 firefox.exe 51 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"C:\Users\Admin\AppData\Local\Temp\1013334001\vdGy6gA.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 444⤵
- Loads dropped DLL
- Program crash
PID:3192
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013388001\7f32369043.exe"C:\Users\Admin\AppData\Local\Temp\1013388001\7f32369043.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\1013389001\02b5f87448.exe"C:\Users\Admin\AppData\Local\Temp\1013389001\02b5f87448.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1013390001\d393bbd52f.exe"C:\Users\Admin\AppData\Local\Temp\1013390001\d393bbd52f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.0.2135821045\1998333536" -parentBuildID 20221007134813 -prefsHandle 1172 -prefMapHandle 1096 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {53bac810-0995-46f9-98ee-feb4e229e05d} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 1248 103d5158 gpu6⤵PID:2816
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.1.1103370687\442269378" -parentBuildID 20221007134813 -prefsHandle 1536 -prefMapHandle 1532 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {120c9ff4-891a-43f9-8edc-364820695f17} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 1548 43ec258 socket6⤵PID:2740
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.2.357401157\1881356247" -childID 1 -isForBrowser -prefsHandle 2000 -prefMapHandle 1996 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {3f8dabde-314d-4cff-a989-15352bc94863} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 2012 1035d858 tab6⤵PID:1652
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.3.1743242697\2007227223" -childID 2 -isForBrowser -prefsHandle 2792 -prefMapHandle 2788 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8c5252e8-1b24-4549-83f2-a6613f8188cd} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 2804 1bfdeb58 tab6⤵PID:580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.4.147899303\1109485245" -childID 3 -isForBrowser -prefsHandle 3944 -prefMapHandle 3820 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b8aaccdf-9a12-412f-8bfc-d09125b23ab2} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 3952 1c5fd258 tab6⤵PID:2912
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.5.975327400\349579289" -childID 4 -isForBrowser -prefsHandle 4060 -prefMapHandle 4064 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {92fada08-055d-46c4-a17b-61ba12d08089} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 4048 1c5fb758 tab6⤵PID:2492
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2784.6.150257259\575649741" -childID 5 -isForBrowser -prefsHandle 4240 -prefMapHandle 4244 -prefsLen 26356 -prefMapSize 233444 -jsInitHandle 644 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {308c86d4-dec6-4372-b10a-258c13acafaf} 2784 "\\.\pipe\gecko-crash-server-pipe.2784" 4228 1c5fc658 tab6⤵PID:1224
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013391001\b3564cb47c.exe"C:\Users\Admin\AppData\Local\Temp\1013391001\b3564cb47c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1916
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\activity-stream.discovery_stream.json.tmp
Filesize32KB
MD576640048a90e605b9bb0fe9576b32e9a
SHA181034ab41c64d7891e47e5866f2041e360d1f3a3
SHA2561f1ab92da85817242e096ed9488ed7c067608dbe6b8417e28ff4b2a19381eba2
SHA512290249aebfc568b1315642e262c55538253f2b54a55e0ad56f577fbf7788fd6a0d0e98a1c720dca35a92ac2dc0e06176603a525545ed7d8688c13807875ef127
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD52a78ce9f3872f5e591d643459cabe476
SHA19ac947dfc71a868bc9c2eb2bd78dfb433067682e
SHA25621a2ac44acd7a640735870eebfd04b8dc57bc66877cb5be3b929299e86a43dae
SHA51203e2cd8161a1394ee535a2ea7d197791ab715d69a02ffab98121ec5ac8150d2b17a9a32a59307042c4bbeffad7425b55efa047651de6ed39277dba80711454f9
-
Filesize
1.8MB
MD5d398a6c545b1aecb1c7046c91a2ef636
SHA1c48c073a2d2cf6017d0c49004882db7053d1e305
SHA256a79534430d6ef7642ad000dde7c34366027eaed4373cd2d74c624384b1873054
SHA5125a60eaee64d446be75ff5cc166fa28ec3698c75d6d942efddbc840d322f90fae75ba8c668e1422f3acac0f213949760b17ae09ee2cb1cd8c156a7f9b5e6f4ad7
-
Filesize
1.7MB
MD509d1a1276ff8fbe9dc8703db22ed155d
SHA11b6a30d6a9305cb79206b6f20b3329c0d66c54fc
SHA256e66fef29df453dfd67e5db61f4c847d74ad7ace5a9dedc71c45efd5119a038f1
SHA512af306ad0f60efe62177b17a8c9b5ea746f5793819e7e8bfec8613b9637e330a240ea4baca2aacc884ced46aba3fe811222f25b4ecb6cf50e9af7214373106428
-
Filesize
949KB
MD5736f6a847a1ad3eea241ba1d9c2ea3bf
SHA1a7f6938bf1c6b896ff20eb375c1b639e8d793a33
SHA25610fd96b0490b2d02fc335c07d142574f61d4997e8ead152c01b75314ff51c23b
SHA512775dce2301f1653b12774981d739b0b743a1129ac7f6bdd552df0d73e603ee2af1262ac77bf2e4fdda5d71dc7bd4615586d06780270a39f95e6b363993975ea3
-
Filesize
2.6MB
MD59e4e898045069f98318963270da27bf0
SHA1f65a9fcd5472e82f497a8bf6eb833505c970e650
SHA25653ae8fdd7c2de8c0ce628a30fda8060fa22e28df0781bc1aefbdb2441655972e
SHA512e2c08e98f1434464bfeeb262b09dcb39fdf819ceb4f3b0064461951005d38f5528326948dc6ff4e2dcba6fc7f6dd838796fd57162bc5a6f6c75ae84ded21fc3c
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD51a46dde7c0214279d24fd70b2bc126dc
SHA19a635a98fc25b31a5e27fd12b4d6b64620558808
SHA256d22088fbe8a9f5644b689fd90da040e8d05bc76deac90411a606c8d1fa49b709
SHA51243d22905738780779361b1b404df8177bc31571395c7211a06c69d9a97e45e95fa534a6c387ebfec93dc52becf236b4f203a1bce5b0dd07aef0c58493df1bac7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\02e4e313-7b27-4d3f-8551-e6899924aa2b
Filesize10KB
MD5a12e9737d43203a1c61bbde413039588
SHA16a75bcc5052a6b2bc30ba4d0a9d9233dd9db62f5
SHA256b728706ec2aad83256448a3a9b34a5abc1a878ca5b18787d8abb0567babf79de
SHA512a2c110e78fd44c008b66df0fb5668439150e62c051b6966cddddb819bf7b09b8427e8896ba81e9b08401f5c7db523359781973ba53161256d22d8cfd6ae110ce
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\183449f9-8461-4325-9b2c-cec34f4fce00
Filesize745B
MD584b70db8ec40b1ff3732c9a4c44fe525
SHA1c265154e8176ba58fe2bb4902ebe39a84bc253e6
SHA2569aee5c9d5fb8c7188c839d5c4c38ca98d6b5f471e35ee636280f0c30d4f5f018
SHA512e941c50724ab2b2db86bc688c90a5545438715b86cffad25bfd0e659e253690f9568e08767d9aeabdac6737d34a3bd8c18e69cdfa8317f6390d8d9b7d9a9fc15
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD55dce325833c6428f4f41e5a318101bc4
SHA1cbe56c087c0ea3fc51ccc2934b38cb46c2f853eb
SHA25664b5e5f7cac5f08a9f51390567176bed955532b429ac8cbaf776d34bec94dcd8
SHA5123a20149017664d8bf75ce0b2b551d7513223c953da6b0bd31bce71ba571610b62405c62b4f2ddb8c64e7724ef57b0bd17da143fdb3e32c8faf944020ad9716d3
-
Filesize
6KB
MD5ab4ad1372ddaec72454f8b07170d85a1
SHA10697623d2bc2d9e17e2a011c0a2ab1525f88c295
SHA256e4545103b221d383bf697bb557cc9b3d1e0835a91213e32e190c7fa667a188bc
SHA5129acf07b654159767ba4f4eb939b2173524d3937be59e197416e39aba81cda3d9c27083fc504bb3a486931717ad8cab42c3dd1736a5d280b0bb841dffccf6f3f9
-
Filesize
6KB
MD51953f1a9af1c6e35c1e7e9fde80abf2e
SHA1320f5afc3b6c7227dadca8a58320076b2176e3e0
SHA256ee87fc54e8ba78b95d7feb83b161c8b94e1ca8a15ea8c73db86ae577b7df6c56
SHA512144aa19fddb637f13d6f4611797d4b6cab67138afcde0d83141a1157676d87620610a3102401fa61e3a699ab2774f31447d604a0d13b9e40ecf91a30dfc65414
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5e19a7e6f2643ed53d2050ad9d52121f2
SHA10e730e3a0599ff8d129fb356e10b46cfcb4f9135
SHA2566d49c95468b1c621afc806bac3345f28adde256dad7ca1260a5ec735ea37472a
SHA512063c083f4237bbdf6e9630d63c2348bfd4148c18636010f83662c2482ca8d769496a2c8aee6f3e3aec10dc2865b082183a0dbcc424ef81a3759b60d8321a1493
-
Filesize
3.1MB
MD531b1538dfcc40163da1a24b8a48e6c90
SHA14377e5c025672f6dca9ed52bd08ca164b89bdca2
SHA256e7aa9c79350c8dab8bd903b453f3dfd899956698fb717c91ac3cab9dec75f361
SHA5123eb7b3d132ccf5c52e64eac37a00b07c3ec2a3c111cdfb2d229963b31f688f204252021be233b0d967ee4bbb3b79b62182bf1ec02247753a826218910733960e