Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
d75b31ba6f3bebdb12b9c28a09d444f9
-
SHA1
80f5231691ec242eb62324bdf2986c50ae9b2ac8
-
SHA256
e951c2f841b3ca0b3bb4ba865ab40d102a6074a4b6f74c0c10d99f6ea125c2cf
-
SHA512
24de73a3543d2474ce6c40ec11c814361f3200b752ff165c8283628504b7bba5090e48713314fddde076518060ca18fe7043113aeed24e36e29fb07c057d77ed
-
SSDEEP
49152:NcyRqEl5yhyZfpyqcm8consSF1nWSKiYRl7Ea+iwFCrlxbuGLfd:ZRGhyZfpyzmVtAAJZJ9+iwFCnbB7d
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://se-blurry.biz/api
https://zinc-sneark.biz/api
Signatures
-
Amadey family
-
Gcleaner family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 489150765f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 489150765f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 489150765f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 489150765f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 489150765f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 489150765f.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 11fa64c3be.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 489150765f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ db22f3bf8c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f84b79a306.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 11fa64c3be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 489150765f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion db22f3bf8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 11fa64c3be.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 489150765f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion db22f3bf8c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f84b79a306.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f84b79a306.exe -
Executes dropped EXE 7 IoCs
pid Process 2724 skotes.exe 2828 8d7982f583.exe 504 db22f3bf8c.exe 2068 f84b79a306.exe 488 11fa64c3be.exe 2368 c32082fd90.exe 3532 489150765f.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine db22f3bf8c.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine f84b79a306.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 11fa64c3be.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine 489150765f.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine file.exe -
Loads dropped DLL 13 IoCs
pid Process 2372 file.exe 2372 file.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 2724 skotes.exe 504 db22f3bf8c.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 489150765f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 489150765f.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\f84b79a306.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013511001\\f84b79a306.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\11fa64c3be.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013512001\\11fa64c3be.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\c32082fd90.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013513001\\c32082fd90.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\489150765f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013514001\\489150765f.exe" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00050000000193a4-129.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2372 file.exe 2724 skotes.exe 504 db22f3bf8c.exe 2068 f84b79a306.exe 488 11fa64c3be.exe 3532 489150765f.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11fa64c3be.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language c32082fd90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f84b79a306.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db22f3bf8c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 489150765f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c32082fd90.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage c32082fd90.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 2636 taskkill.exe 332 taskkill.exe 2880 taskkill.exe 3064 taskkill.exe 2752 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000_Classes\Local Settings firefox.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2372 file.exe 2724 skotes.exe 504 db22f3bf8c.exe 2068 f84b79a306.exe 488 11fa64c3be.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 3532 489150765f.exe 3532 489150765f.exe 3532 489150765f.exe 3532 489150765f.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2880 taskkill.exe Token: SeDebugPrivilege 3064 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2636 taskkill.exe Token: SeDebugPrivilege 332 taskkill.exe Token: SeDebugPrivilege 2796 firefox.exe Token: SeDebugPrivilege 2796 firefox.exe Token: SeDebugPrivilege 3532 489150765f.exe -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 2372 file.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2796 firefox.exe 2796 firefox.exe 2796 firefox.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe 2368 c32082fd90.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2724 2372 file.exe 30 PID 2372 wrote to memory of 2724 2372 file.exe 30 PID 2372 wrote to memory of 2724 2372 file.exe 30 PID 2372 wrote to memory of 2724 2372 file.exe 30 PID 2724 wrote to memory of 2828 2724 skotes.exe 33 PID 2724 wrote to memory of 2828 2724 skotes.exe 33 PID 2724 wrote to memory of 2828 2724 skotes.exe 33 PID 2724 wrote to memory of 2828 2724 skotes.exe 33 PID 2724 wrote to memory of 504 2724 skotes.exe 35 PID 2724 wrote to memory of 504 2724 skotes.exe 35 PID 2724 wrote to memory of 504 2724 skotes.exe 35 PID 2724 wrote to memory of 504 2724 skotes.exe 35 PID 2724 wrote to memory of 2068 2724 skotes.exe 36 PID 2724 wrote to memory of 2068 2724 skotes.exe 36 PID 2724 wrote to memory of 2068 2724 skotes.exe 36 PID 2724 wrote to memory of 2068 2724 skotes.exe 36 PID 2724 wrote to memory of 488 2724 skotes.exe 38 PID 2724 wrote to memory of 488 2724 skotes.exe 38 PID 2724 wrote to memory of 488 2724 skotes.exe 38 PID 2724 wrote to memory of 488 2724 skotes.exe 38 PID 2724 wrote to memory of 2368 2724 skotes.exe 40 PID 2724 wrote to memory of 2368 2724 skotes.exe 40 PID 2724 wrote to memory of 2368 2724 skotes.exe 40 PID 2724 wrote to memory of 2368 2724 skotes.exe 40 PID 2368 wrote to memory of 2880 2368 c32082fd90.exe 41 PID 2368 wrote to memory of 2880 2368 c32082fd90.exe 41 PID 2368 wrote to memory of 2880 2368 c32082fd90.exe 41 PID 2368 wrote to memory of 2880 2368 c32082fd90.exe 41 PID 2368 wrote to memory of 3064 2368 c32082fd90.exe 43 PID 2368 wrote to memory of 3064 2368 c32082fd90.exe 43 PID 2368 wrote to memory of 3064 2368 c32082fd90.exe 43 PID 2368 wrote to memory of 3064 2368 c32082fd90.exe 43 PID 2368 wrote to memory of 2752 2368 c32082fd90.exe 45 PID 2368 wrote to memory of 2752 2368 c32082fd90.exe 45 PID 2368 wrote to memory of 2752 2368 c32082fd90.exe 45 PID 2368 wrote to memory of 2752 2368 c32082fd90.exe 45 PID 2368 wrote to memory of 2636 2368 c32082fd90.exe 47 PID 2368 wrote to memory of 2636 2368 c32082fd90.exe 47 PID 2368 wrote to memory of 2636 2368 c32082fd90.exe 47 PID 2368 wrote to memory of 2636 2368 c32082fd90.exe 47 PID 2368 wrote to memory of 332 2368 c32082fd90.exe 49 PID 2368 wrote to memory of 332 2368 c32082fd90.exe 49 PID 2368 wrote to memory of 332 2368 c32082fd90.exe 49 PID 2368 wrote to memory of 332 2368 c32082fd90.exe 49 PID 2368 wrote to memory of 2852 2368 c32082fd90.exe 51 PID 2368 wrote to memory of 2852 2368 c32082fd90.exe 51 PID 2368 wrote to memory of 2852 2368 c32082fd90.exe 51 PID 2368 wrote to memory of 2852 2368 c32082fd90.exe 51 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2852 wrote to memory of 2796 2852 firefox.exe 52 PID 2796 wrote to memory of 2060 2796 firefox.exe 53 PID 2796 wrote to memory of 2060 2796 firefox.exe 53 PID 2796 wrote to memory of 2060 2796 firefox.exe 53 PID 2796 wrote to memory of 988 2796 firefox.exe 54 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\1013509001\8d7982f583.exe"C:\Users\Admin\AppData\Local\Temp\1013509001\8d7982f583.exe"3⤵
- Executes dropped EXE
PID:2828
-
-
C:\Users\Admin\AppData\Local\Temp\1013510001\db22f3bf8c.exe"C:\Users\Admin\AppData\Local\Temp\1013510001\db22f3bf8c.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:504
-
-
C:\Users\Admin\AppData\Local\Temp\1013511001\f84b79a306.exe"C:\Users\Admin\AppData\Local\Temp\1013511001\f84b79a306.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1013512001\11fa64c3be.exe"C:\Users\Admin\AppData\Local\Temp\1013512001\11fa64c3be.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:488
-
-
C:\Users\Admin\AppData\Local\Temp\1013513001\c32082fd90.exe"C:\Users\Admin\AppData\Local\Temp\1013513001\c32082fd90.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:332
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.0.1019120997\1203486434" -parentBuildID 20221007134813 -prefsHandle 1220 -prefMapHandle 1212 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {77ac1668-cd2f-43fd-b9d8-6917501471d4} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1296 11fd6558 gpu6⤵PID:2060
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.1.2123302930\1083990043" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {07c87776-26ec-4851-b87c-d6568a4e4b6d} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 1500 e72758 socket6⤵PID:988
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.2.2040243020\1794992931" -childID 1 -isForBrowser -prefsHandle 2092 -prefMapHandle 2088 -prefsLen 21811 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08124cc9-3086-4837-aead-b8343f76522c} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 2104 1a1c7058 tab6⤵PID:904
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.3.1677882000\1172930625" -childID 2 -isForBrowser -prefsHandle 2540 -prefMapHandle 2552 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {08371de2-17c7-496a-98ff-5a922813e638} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 2580 18ebe458 tab6⤵PID:2312
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.4.1514861220\1553210292" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3844 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {68653f4f-e517-4b0b-addf-5384127c47a8} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3856 20de9858 tab6⤵PID:2428
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.5.2009972106\381895884" -childID 4 -isForBrowser -prefsHandle 3968 -prefMapHandle 3972 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {b53667c2-a198-481b-bf79-39ef7634e0c0} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 3960 20de9b58 tab6⤵PID:1468
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2796.6.1679132407\1326220791" -childID 5 -isForBrowser -prefsHandle 4148 -prefMapHandle 4152 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 860 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {2e908e41-82a8-4daf-84d6-252a0bb1146e} 2796 "\\.\pipe\gecko-crash-server-pipe.2796" 4140 20dea758 tab6⤵PID:2752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013514001\489150765f.exe"C:\Users\Admin\AppData\Local\Temp\1013514001\489150765f.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\7CNUR30T\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD54c83ff0a2537b77bafbbdbd6591cdaf0
SHA143f64870149b4cae516b49cd509717d38dd82d5c
SHA256074ae26ab9373e1890edee52447db89742d4a03300195cf008724597ff0509bf
SHA51288fb23dfe7da18bd8dd1d9ec6404f4f90abff1b7f6d6cfbcb461c27c0b55c804c21a43c8d4b0d0f93674a2a339319b6c623a12a59004a5fcd9477344996e4904
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
809KB
MD59a2cc9d6c6282e7b2a0ff5649a70b0df
SHA199c7c3969c9ab39261b59f047514ff7de2bc4c07
SHA256b08f2b65885b9ae1825d27ddf6dc9189641e0f8817999f4386da55ffcc548287
SHA512b61aa465d601a75426129b2096e900c008faeee6d67b729bf3b2fdeef6957934e9bba7353ad55b499c2722f5381c9cc684f867e4c2b7958e743d1a459eae88d7
-
Filesize
1.9MB
MD5f7a47830f40cc4b6a06d777fab2f42f9
SHA15302227fbac3aea59d3aa18dc1e429ebe448c732
SHA2568a331ca76c2b919f30406ff66a92db0e27ae6af9725749a80959b42656871536
SHA51267251194db27bbb06cc3638c7fd453cc66f54b6e9aa1421cbd05ba5aa410f333b83f5587186bbd0b2026f05da1119eed68c8cfa64511b9c4d81d9a13d9634f1b
-
Filesize
1.8MB
MD52b86aab9799fdb49d90e8d5c3f773c33
SHA173f675bfc40ae943545488f8279ff6969d47588b
SHA25607a31ff1a605c2c322b555d4a0343f99fb780ab06b05dc6c0a8c0a426f5bd04a
SHA512679f83173542bb3490685c53eec897b28676cf7f3f52714db5d9d37507d2998d2bfeed1125dadbed19809cd97d803f006944bcd0ead6e5838aadc01b3b0e8250
-
Filesize
1.7MB
MD53a76ab70c01da0f818f89bfe4e904ee3
SHA1c0ebf4afaae2542f315c72853aaaab84e1a59874
SHA25631fa2d30829b1edde94cc00cac6af01bf9075cb7dba356301566624f586aa2c1
SHA51206ad07e86e5a896768792c77197f0029489f81d55c71874d94f5f718a3cf55bc3f2740e0f43479deea3fae49ce1adf5baf5b03227162fb827303af2c14c0a867
-
Filesize
950KB
MD53f7ba360c993567431731dd9e8eb6a67
SHA186b020c1350c91ff191c66b7ef4482c444eee7de
SHA2564c68695dbd51d87109946460adcb0cd159b3331d0ce13f6a26755e3c8d34e017
SHA512dd8e2de9df549b0442e7f4669d061f8024aaa73b1e30915b99af5c98a9aeed7563b8312cd3cf62325a03cbb191ba75dfd94da5fd84e056d380303ae4cd4b1e13
-
Filesize
2.7MB
MD5bb21543a1e27325f9ea87bab89facf4b
SHA12dbdf71b803baf20bf11b1e0b1c9bd75fccb2c51
SHA2566066601bd1264d08e87e2494c02ea6aea5eff0657f6b76ca33853c98f3544a45
SHA5124ec5dfaa1ebccead38c4684840c5f95789f481fe12f7d34c00b79a181cf2b33e44b900119c389485d26329fb796c2d6b2a8c0558051f0198f062bd15c9d76bce
-
Filesize
3.1MB
MD5d75b31ba6f3bebdb12b9c28a09d444f9
SHA180f5231691ec242eb62324bdf2986c50ae9b2ac8
SHA256e951c2f841b3ca0b3bb4ba865ab40d102a6074a4b6f74c0c10d99f6ea125c2cf
SHA51224de73a3543d2474ce6c40ec11c814361f3200b752ff165c8283628504b7bba5090e48713314fddde076518060ca18fe7043113aeed24e36e29fb07c057d77ed
-
Filesize
442KB
MD585430baed3398695717b0263807cf97c
SHA1fffbee923cea216f50fce5d54219a188a5100f41
SHA256a9f4281f82b3579581c389e8583dc9f477c7fd0e20c9dfc91a2e611e21e3407e
SHA51206511f1f6c6d44d076b3c593528c26a602348d9c41689dbf5ff716b671c3ca5756b12cb2e5869f836dedce27b1a5cfe79b93c707fd01f8e84b620923bb61b5f1
-
Filesize
8.0MB
MD5a01c5ecd6108350ae23d2cddf0e77c17
SHA1c6ac28a2cd979f1f9a75d56271821d5ff665e2b6
SHA256345d44e3aa3e1967d186a43d732c8051235c43458169a5d7d371780a6475ee42
SHA512b046dd1b26ec0b810ee441b7ad4dc135e3f1521a817b9f3db60a32976352e8f7e53920e1a77fc5b4130aac260d79deef7e823267b4414e9cc774d8bffca56a72
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD5ef07b1243005fb6f907f1e72e5cda79a
SHA12e7857b32c8bc367dbab91e8a3556e0e43ce71d1
SHA256e714262d5caf28a3664df72bcce27e7fff1cd58f2b544cdb71827c077cf23aa1
SHA5124d69667c4a2f84a50b4f905940b8b5888b801292d00b0b91f8e302275c411093e952d272756949b0feff1dcdf71bf42c617361b7bf009880fe7b0ae1b1198e23
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\33512300-e6af-4977-8a3a-346a742517d0
Filesize12KB
MD58ffc00d22c12b0286a4d1c8f30596129
SHA1d2743238969db2914a88099c8a2b9f6f939bec24
SHA2567fced59df86660c01639eebece6aea3fabb8f925e0205c60350f336257834049
SHA5126b81440eaf74a2557c29a4846b59116e0866a8330141bb1e13f7f72621a8aafc9ce76cfa07899cb2c22bff3e08c61336200ce52f363d70a31a003bccdf982cbb
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\datareporting\glean\pending_pings\9935fc0d-bb60-4ad6-8f68-eb45bffeccd3
Filesize745B
MD52af571ce1a814c1bd429eb58448e9862
SHA15b8e1e965832dd6866a6a3b28d0fe99782eeda6c
SHA2566df6a60f50033456a4d438d60ca5f3e37c99e29645fb8467406356192b93ffca
SHA51265a356866f6d61fe067c89421e2477854489cccc02eb4ca05b642029b04adf5a6718ceab26353b3856926ef098997e12e1a932204a7779dbd6a24d4097e43318
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll
Filesize997KB
MD5fe3355639648c417e8307c6d051e3e37
SHA1f54602d4b4778da21bc97c7238fc66aa68c8ee34
SHA2561ed7877024be63a049da98733fd282c16bd620530a4fb580dacec3a78ace914e
SHA5128f4030bb2464b98eccbea6f06eb186d7216932702d94f6b84c56419e9cf65a18309711ab342d1513bf85aed402bc3535a70db4395874828f0d35c278dd2eac9c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.info
Filesize116B
MD53d33cdc0b3d281e67dd52e14435dd04f
SHA14db88689282fd4f9e9e6ab95fcbb23df6e6485db
SHA256f526e9f98841d987606efeaff7f3e017ba9fd516c4be83890c7f9a093ea4c47b
SHA512a4a96743332cc8ef0f86bc2e6122618bfc75ed46781dadbac9e580cd73df89e74738638a2cccb4caa4cbbf393d771d7f2c73f825737cdb247362450a0d4a4bc1
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\LICENSE.txt
Filesize479B
MD549ddb419d96dceb9069018535fb2e2fc
SHA162aa6fea895a8b68d468a015f6e6ab400d7a7ca6
SHA2562af127b4e00f7303de8271996c0c681063e4dc7abdc7b2a8c3fe5932b9352539
SHA51248386217dabf7556e381ab3f5924b123a0a525969ff98f91efb03b65477c94e48a15d9abcec116b54616d36ad52b6f1d7b8b84c49c204e1b9b43f26f2af92da2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\manifest.json
Filesize372B
MD58be33af717bb1b67fbd61c3f4b807e9e
SHA17cf17656d174d951957ff36810e874a134dd49e0
SHA256e92d3394635edfb987a7528e0ccd24360e07a299078df2a6967ca3aae22fa2dd
SHA5126125f60418e25fee896bf59f5672945cd8f36f03665c721837bb50adf5b4dfef2dddbfcfc817555027dcfa90e1ef2a1e80af1219e8063629ea70263d2fc936a7
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll
Filesize11.8MB
MD533bf7b0439480effb9fb212efce87b13
SHA1cee50f2745edc6dc291887b6075ca64d716f495a
SHA2568ee42d9258e20bbc5bfdfae61605429beb5421ffeaaa0d02b86d4978f4b4ac4e
SHA512d329a1a1d98e302142f2776de8cc2cd45a465d77cb21c461bdf5ee58c68073a715519f449cb673977288fe18401a0abcce636c85abaec61a4a7a08a16c924275
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.lib
Filesize1KB
MD5688bed3676d2104e7f17ae1cd2c59404
SHA1952b2cdf783ac72fcb98338723e9afd38d47ad8e
SHA25633899a3ebc22cb8ed8de7bd48c1c29486c0279b06d7ef98241c92aef4e3b9237
SHA5127a0e3791f75c229af79dd302f7d0594279f664886fea228cfe78e24ef185ae63aba809aa1036feb3130066deadc8e78909c277f0a7ed1e3485df3cf2cd329776
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\gmp-widevinecdm\4.10.2557.0\widevinecdm.dll.sig
Filesize1KB
MD5937326fead5fd401f6cca9118bd9ade9
SHA14526a57d4ae14ed29b37632c72aef3c408189d91
SHA25668a03f075db104f84afdd8fca45a7e4bff7b55dc1a2a24272b3abe16d8759c81
SHA512b232f6cf3f88adb346281167ac714c4c4c7aac15175087c336911946d12d63d3a3a458e06b298b41a7ec582ef09fe238da3a3166ff89c450117228f7485c22d2
-
Filesize
7KB
MD539773f12a073b3d422f4c95f781e6e26
SHA1a6dc42b65765ab91bba3f4f72d6dfb6a1e64c48a
SHA25656c5858727d664ab7809debac4c33e48b4f2eabc17aa2a7be7152587e733ffe4
SHA5128ef974d164d7a42537d7e89ed86d344a46d8331dab44edbd9e96aebc41806c5ab8cea75290ca92c6ddbd3737c6977f23858e59388f4ac9d63efaa7ab4d9c1a1d
-
Filesize
7KB
MD5fea8834a7e645872f303b64c9ada045a
SHA171be23d5b6c5ad683b74a24d3a69711f852a7dc6
SHA2564855f00c577a71cf7e693fd8ae1c25b423d9ba7a169836bd9d536787e54eaeaf
SHA512b427b50b981405e124ece7af20013d7517103722d703f2e718efa317ff4b44b70b3677f30737b159342b7483e686ade320f084e1e2deb0a145b7f3de02cd9324
-
Filesize
6KB
MD52e2991abd17b3b7fd9c0ec2c2884b201
SHA133e2c9d08bc6fa499efff9f8daaab77ec80baadb
SHA256d6841a6806d7ca82cb1d34a39b32c699037296061ac62ef52f7bd0d54d2155d6
SHA512d32feb6d3bb52a7cf292fdbe4eff3be365d2cd46af377a8921459a0a6072ef1eab87cfc5ea6e38b199f40512e14aef197675ecbb41547ae9d18e094107b04bbf
-
Filesize
6KB
MD59ec34b47e442300a31cbd884b6c6ff0a
SHA10d6d27ae3d7d26070e79cef7ef84672a3d131fac
SHA2567d62510771a1535d6b9e556f96aadf8064dd3bee668dd6737af4753ad6bb67d2
SHA512e29b86fca601ebc6bd0f122f3528a3a510d347ff1eed3c84cb459c8dcc15bd80d32806c00e22c4a6f807b41358b770f0c15e4f6818544d3e0e74f1e10846eb4b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\ytcgl2sn.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5989557af82493a91352c4d17c11e17f2
SHA1cf6aa119eb2b02f5165776df5d5c2558a315f03e
SHA2569fd23f25db3733cee3cc6e4e7ca56d33e7f563d3f843eaafc6d5203b33c77b9e
SHA512748510b8d4ad18b031d3391dcae22f702bb27031e0349688102856bb89af83322c569143b3b9d467a5427d9cf6ebb7d0e97446d90ef4e7c8df9111492c41794e
-
Filesize
1.4MB
MD5a8cf5621811f7fac55cfe8cb3fa6b9f6
SHA1121356839e8138a03141f5f5856936a85bd2a474
SHA256614a0362ab87cee48d0935b5bb957d539be1d94c6fdeb3fe42fac4fbe182c10c
SHA5124479d951435f222ca7306774002f030972c9f1715d6aaf512fca9420dd79cb6d08240f80129f213851773290254be34f0ff63c7b1f4d554a7db5f84b69e84bdd