Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240903-en
General
-
Target
file.exe
-
Size
2.9MB
-
MD5
41e1b89657936a9f325d226251164e1b
-
SHA1
de03b88abbdeb975e8aa2094a38bf98b7840f13b
-
SHA256
ded5a181286b7bf7971993b0392ee15dec6d42f4b48f5356b3b89d9f2aed48d9
-
SHA512
bd859efdd017b1fa470ad5b6eeb31b0cf782fc4182d48a4de31a8bdd693415af062ef0ac514ff36e0faa52125fc79cccb15f828fd1a9b7929d59b40b2dfa02e4
-
SSDEEP
49152:jRRnBqjB9QLCF6JHaPQucq0KpOmgvrHOVzqT:jR9BuB94CF6JHWpBpOmUbOVS
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://impend-differ.biz/api
https://print-vexer.biz/api
https://dare-curbys.biz/api
https://covery-mover.biz/api
https://formy-spill.biz/api
https://dwell-exclaim.biz/api
https://zinc-sneark.biz/api
https://se-blurry.biz/api
https://drive-connect.cyou/api
https://sordid-snaked.cyou/api
https://awake-weaves.cyou/api
https://wrathful-jammy.cyou/api
https://debonairnukk.xyz/api
https://diffuculttan.xyz/api
https://effecterectz.xyz/api
https://deafeninggeh.biz/api
https://immureprech.biz/api
https://tacitglibbr.biz/api
Extracted
cryptbot
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
https://drive-connect.cyou/api
https://tacitglibbr.biz/api
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF b5a33b0a10.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5ec59fd910.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ b5a33b0a10.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 61a6997f88.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c56c28b622.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion b5a33b0a10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 61a6997f88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c56c28b622.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5ec59fd910.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5ec59fd910.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion b5a33b0a10.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 61a6997f88.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c56c28b622.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\GoogleChrome.lnk GjYb9rKYNCz7Zidp.exe -
Executes dropped EXE 51 IoCs
pid Process 2748 skotes.exe 2432 ShtrayEasy35.exe 1720 GjYb9rKYNCz7Zidp.exe 1284 6kLI3yElEliDVPbP.exe 2972 SiRteRmsMZf2YQR5.exe 2276 WNHsAe386amOd9zU.exe 2012 P678RaX0BtTiVhh6.exe 2832 dmUgwA0sD5SbYSrU.exe 2584 qhZopDCoXvPPxA7p.exe 1592 tdTU0vHMYMh9uvaY.exe 2068 NDZWIxdd8kREvzXJ.exe 908 Kh01cAPxL8dT6UMm.exe 2452 0ur0Tr3nGmux38ye.exe 544 TcSQJVrf2whXuuWi.exe 1740 JwH35MtiyxUlU575.exe 1732 MlDk0WBNYva1pNuW.exe 888 fTiPlbGvu7cUnLEf.exe 1520 UjOC32UK9iROUC3q.exe 2256 kgdDHf52clw46LmS.exe 696 rfQJPPpc7dBE8LfY.exe 1344 7B24GcEq7KDbThEN.exe 1436 PgGTc88lAYT2mOqA.exe 792 IQ7ux2z.exe 2768 ea8b4f148b.exe 2688 T3V13WPgldPgYcsY.exe 900 czK0foXzNT0zDnlC.exe 2032 ea8b4f148b.exe 2208 DKz22Y7NyxW9hbbl.exe 1324 bBHplRrIBrqTTW6X.exe 2484 199zSopyRWfBuPAz.exe 2324 5ec59fd910.exe 3044 GV2tKWz0VKUONuIy.exe 2916 THIdTiOqYsuzNBE4.exe 2676 J5G3mEJSz74pEdE8.exe 2252 iXIPZNMuwOsJz7v2.exe 2692 b5a33b0a10.exe 2244 17b2ba3f91.exe 2760 RSv87z1Jo4h8s4Yb.exe 1944 jJlhVnVhOI0PjBln.exe 2992 8RyjFHSJTzH2wsnK.exe 2928 dpGxB2Smty5d6USt.exe 2560 61a6997f88.exe 1932 Pjt7un2JTeqTZZzP.exe 4260 CJEkYXZz4HH8GuSo.exe 4288 KAHqzqR2rU9nX2eB.exe 3552 c56c28b622.exe 4588 f926adfd0f.exe 3928 a8xs4jlgsxI3FlDY.exe 4624 NXJ7DpfbuYa5ATOv.exe 4020 JzmB1NZ2frhWyi2M.exe 8160 Kwju9bSB4IR6J6jO.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 5ec59fd910.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine b5a33b0a10.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 61a6997f88.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine c56c28b622.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine file.exe -
Loads dropped DLL 55 IoCs
pid Process 2556 file.exe 2556 file.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 1720 GjYb9rKYNCz7Zidp.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2768 ea8b4f148b.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2748 skotes.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2748 skotes.exe 2748 skotes.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2748 skotes.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe 2432 ShtrayEasy35.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\GoogleChrome = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aEC3g3xj\\GjYb9rKYNCz7Zidp.exe" GjYb9rKYNCz7Zidp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\61a6997f88.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015716001\\61a6997f88.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\c56c28b622.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015717001\\c56c28b622.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\f926adfd0f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015718001\\f926adfd0f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\37c02a8756.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1015719001\\37c02a8756.exe" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001c778-2162.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2556 file.exe 2748 skotes.exe 2324 5ec59fd910.exe 2692 b5a33b0a10.exe 2560 61a6997f88.exe 3552 c56c28b622.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2768 set thread context of 2032 2768 ea8b4f148b.exe 59 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f926adfd0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GjYb9rKYNCz7Zidp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IQ7ux2z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61a6997f88.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ShtrayEasy35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea8b4f148b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea8b4f148b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5a33b0a10.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17b2ba3f91.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2556 file.exe 2748 skotes.exe 2432 ShtrayEasy35.exe 1720 GjYb9rKYNCz7Zidp.exe 1284 6kLI3yElEliDVPbP.exe 1284 6kLI3yElEliDVPbP.exe 1284 6kLI3yElEliDVPbP.exe 1284 6kLI3yElEliDVPbP.exe 2972 SiRteRmsMZf2YQR5.exe 2972 SiRteRmsMZf2YQR5.exe 2972 SiRteRmsMZf2YQR5.exe 2972 SiRteRmsMZf2YQR5.exe 2972 SiRteRmsMZf2YQR5.exe 2972 SiRteRmsMZf2YQR5.exe 2276 WNHsAe386amOd9zU.exe 2276 WNHsAe386amOd9zU.exe 2276 WNHsAe386amOd9zU.exe 2276 WNHsAe386amOd9zU.exe 2276 WNHsAe386amOd9zU.exe 2276 WNHsAe386amOd9zU.exe 2012 P678RaX0BtTiVhh6.exe 2012 P678RaX0BtTiVhh6.exe 2012 P678RaX0BtTiVhh6.exe 2012 P678RaX0BtTiVhh6.exe 2012 P678RaX0BtTiVhh6.exe 2012 P678RaX0BtTiVhh6.exe 2832 dmUgwA0sD5SbYSrU.exe 2832 dmUgwA0sD5SbYSrU.exe 2832 dmUgwA0sD5SbYSrU.exe 2832 dmUgwA0sD5SbYSrU.exe 2832 dmUgwA0sD5SbYSrU.exe 2832 dmUgwA0sD5SbYSrU.exe 2584 qhZopDCoXvPPxA7p.exe 2584 qhZopDCoXvPPxA7p.exe 2584 qhZopDCoXvPPxA7p.exe 2584 qhZopDCoXvPPxA7p.exe 2584 qhZopDCoXvPPxA7p.exe 2584 qhZopDCoXvPPxA7p.exe 2972 SiRteRmsMZf2YQR5.exe 2276 WNHsAe386amOd9zU.exe 2012 P678RaX0BtTiVhh6.exe 2584 qhZopDCoXvPPxA7p.exe 2832 dmUgwA0sD5SbYSrU.exe 2972 SiRteRmsMZf2YQR5.exe 2584 qhZopDCoXvPPxA7p.exe 2276 WNHsAe386amOd9zU.exe 2012 P678RaX0BtTiVhh6.exe 2832 dmUgwA0sD5SbYSrU.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 1592 tdTU0vHMYMh9uvaY.exe 544 TcSQJVrf2whXuuWi.exe 2068 NDZWIxdd8kREvzXJ.exe 1740 JwH35MtiyxUlU575.exe 2452 0ur0Tr3nGmux38ye.exe 908 Kh01cAPxL8dT6UMm.exe 888 fTiPlbGvu7cUnLEf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 792 IQ7ux2z.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2556 file.exe 4588 f926adfd0f.exe 4588 f926adfd0f.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 4588 f926adfd0f.exe 4588 f926adfd0f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2748 2556 file.exe 31 PID 2556 wrote to memory of 2748 2556 file.exe 31 PID 2556 wrote to memory of 2748 2556 file.exe 31 PID 2556 wrote to memory of 2748 2556 file.exe 31 PID 2748 wrote to memory of 2432 2748 skotes.exe 33 PID 2748 wrote to memory of 2432 2748 skotes.exe 33 PID 2748 wrote to memory of 2432 2748 skotes.exe 33 PID 2748 wrote to memory of 2432 2748 skotes.exe 33 PID 2432 wrote to memory of 1720 2432 ShtrayEasy35.exe 34 PID 2432 wrote to memory of 1720 2432 ShtrayEasy35.exe 34 PID 2432 wrote to memory of 1720 2432 ShtrayEasy35.exe 34 PID 2432 wrote to memory of 1720 2432 ShtrayEasy35.exe 34 PID 2432 wrote to memory of 1284 2432 ShtrayEasy35.exe 35 PID 2432 wrote to memory of 1284 2432 ShtrayEasy35.exe 35 PID 2432 wrote to memory of 1284 2432 ShtrayEasy35.exe 35 PID 2432 wrote to memory of 1284 2432 ShtrayEasy35.exe 35 PID 2432 wrote to memory of 2012 2432 ShtrayEasy35.exe 36 PID 2432 wrote to memory of 2012 2432 ShtrayEasy35.exe 36 PID 2432 wrote to memory of 2012 2432 ShtrayEasy35.exe 36 PID 2432 wrote to memory of 2012 2432 ShtrayEasy35.exe 36 PID 2432 wrote to memory of 2972 2432 ShtrayEasy35.exe 37 PID 2432 wrote to memory of 2972 2432 ShtrayEasy35.exe 37 PID 2432 wrote to memory of 2972 2432 ShtrayEasy35.exe 37 PID 2432 wrote to memory of 2972 2432 ShtrayEasy35.exe 37 PID 2432 wrote to memory of 2832 2432 ShtrayEasy35.exe 38 PID 2432 wrote to memory of 2832 2432 ShtrayEasy35.exe 38 PID 2432 wrote to memory of 2832 2432 ShtrayEasy35.exe 38 PID 2432 wrote to memory of 2832 2432 ShtrayEasy35.exe 38 PID 2432 wrote to memory of 2276 2432 ShtrayEasy35.exe 39 PID 2432 wrote to memory of 2276 2432 ShtrayEasy35.exe 39 PID 2432 wrote to memory of 2276 2432 ShtrayEasy35.exe 39 PID 2432 wrote to memory of 2276 2432 ShtrayEasy35.exe 39 PID 2432 wrote to memory of 2584 2432 ShtrayEasy35.exe 40 PID 2432 wrote to memory of 2584 2432 ShtrayEasy35.exe 40 PID 2432 wrote to memory of 2584 2432 ShtrayEasy35.exe 40 PID 2432 wrote to memory of 2584 2432 ShtrayEasy35.exe 40 PID 2432 wrote to memory of 1592 2432 ShtrayEasy35.exe 41 PID 2432 wrote to memory of 1592 2432 ShtrayEasy35.exe 41 PID 2432 wrote to memory of 1592 2432 ShtrayEasy35.exe 41 PID 2432 wrote to memory of 1592 2432 ShtrayEasy35.exe 41 PID 2432 wrote to memory of 2068 2432 ShtrayEasy35.exe 42 PID 2432 wrote to memory of 2068 2432 ShtrayEasy35.exe 42 PID 2432 wrote to memory of 2068 2432 ShtrayEasy35.exe 42 PID 2432 wrote to memory of 2068 2432 ShtrayEasy35.exe 42 PID 2432 wrote to memory of 1732 2432 ShtrayEasy35.exe 43 PID 2432 wrote to memory of 1732 2432 ShtrayEasy35.exe 43 PID 2432 wrote to memory of 1732 2432 ShtrayEasy35.exe 43 PID 2432 wrote to memory of 1732 2432 ShtrayEasy35.exe 43 PID 2432 wrote to memory of 908 2432 ShtrayEasy35.exe 44 PID 2432 wrote to memory of 908 2432 ShtrayEasy35.exe 44 PID 2432 wrote to memory of 908 2432 ShtrayEasy35.exe 44 PID 2432 wrote to memory of 908 2432 ShtrayEasy35.exe 44 PID 2432 wrote to memory of 1520 2432 ShtrayEasy35.exe 45 PID 2432 wrote to memory of 1520 2432 ShtrayEasy35.exe 45 PID 2432 wrote to memory of 1520 2432 ShtrayEasy35.exe 45 PID 2432 wrote to memory of 1520 2432 ShtrayEasy35.exe 45 PID 2432 wrote to memory of 2452 2432 ShtrayEasy35.exe 46 PID 2432 wrote to memory of 2452 2432 ShtrayEasy35.exe 46 PID 2432 wrote to memory of 2452 2432 ShtrayEasy35.exe 46 PID 2432 wrote to memory of 2452 2432 ShtrayEasy35.exe 46 PID 2432 wrote to memory of 2256 2432 ShtrayEasy35.exe 47 PID 2432 wrote to memory of 2256 2432 ShtrayEasy35.exe 47 PID 2432 wrote to memory of 2256 2432 ShtrayEasy35.exe 47 PID 2432 wrote to memory of 2256 2432 ShtrayEasy35.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"C:\Users\Admin\AppData\Local\Temp\1015564001\ShtrayEasy35.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\aEC3g3xj\GjYb9rKYNCz7Zidp.exeC:\Users\Admin\AppData\Local\Temp\aEC3g3xj\GjYb9rKYNCz7Zidp.exe 24324⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\6kLI3yElEliDVPbP.exeC:\Users\Admin\AppData\Local\Temp\1015564001\6kLI3yElEliDVPbP.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1284
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\P678RaX0BtTiVhh6.exeC:\Users\Admin\AppData\Local\Temp\1015564001\P678RaX0BtTiVhh6.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2012
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\SiRteRmsMZf2YQR5.exeC:\Users\Admin\AppData\Local\Temp\1015564001\SiRteRmsMZf2YQR5.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\dmUgwA0sD5SbYSrU.exeC:\Users\Admin\AppData\Local\Temp\1015564001\dmUgwA0sD5SbYSrU.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\WNHsAe386amOd9zU.exeC:\Users\Admin\AppData\Local\Temp\1015564001\WNHsAe386amOd9zU.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\qhZopDCoXvPPxA7p.exeC:\Users\Admin\AppData\Local\Temp\1015564001\qhZopDCoXvPPxA7p.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2584
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\tdTU0vHMYMh9uvaY.exeC:\Users\Admin\AppData\Local\Temp\1015564001\tdTU0vHMYMh9uvaY.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\NDZWIxdd8kREvzXJ.exeC:\Users\Admin\AppData\Local\Temp\1015564001\NDZWIxdd8kREvzXJ.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2068
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\MlDk0WBNYva1pNuW.exeC:\Users\Admin\AppData\Local\Temp\1015564001\MlDk0WBNYva1pNuW.exe 24324⤵
- Executes dropped EXE
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\Kh01cAPxL8dT6UMm.exeC:\Users\Admin\AppData\Local\Temp\1015564001\Kh01cAPxL8dT6UMm.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:908
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\UjOC32UK9iROUC3q.exeC:\Users\Admin\AppData\Local\Temp\1015564001\UjOC32UK9iROUC3q.exe 24324⤵
- Executes dropped EXE
PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\0ur0Tr3nGmux38ye.exeC:\Users\Admin\AppData\Local\Temp\1015564001\0ur0Tr3nGmux38ye.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\kgdDHf52clw46LmS.exeC:\Users\Admin\AppData\Local\Temp\1015564001\kgdDHf52clw46LmS.exe 24324⤵
- Executes dropped EXE
PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\TcSQJVrf2whXuuWi.exeC:\Users\Admin\AppData\Local\Temp\1015564001\TcSQJVrf2whXuuWi.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:544
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\rfQJPPpc7dBE8LfY.exeC:\Users\Admin\AppData\Local\Temp\1015564001\rfQJPPpc7dBE8LfY.exe 24324⤵
- Executes dropped EXE
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\JwH35MtiyxUlU575.exeC:\Users\Admin\AppData\Local\Temp\1015564001\JwH35MtiyxUlU575.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\7B24GcEq7KDbThEN.exeC:\Users\Admin\AppData\Local\Temp\1015564001\7B24GcEq7KDbThEN.exe 24324⤵
- Executes dropped EXE
PID:1344
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\fTiPlbGvu7cUnLEf.exeC:\Users\Admin\AppData\Local\Temp\1015564001\fTiPlbGvu7cUnLEf.exe 24324⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\PgGTc88lAYT2mOqA.exeC:\Users\Admin\AppData\Local\Temp\1015564001\PgGTc88lAYT2mOqA.exe 24324⤵
- Executes dropped EXE
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\czK0foXzNT0zDnlC.exeC:\Users\Admin\AppData\Local\Temp\1015564001\czK0foXzNT0zDnlC.exe 24324⤵
- Executes dropped EXE
PID:900
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\T3V13WPgldPgYcsY.exeC:\Users\Admin\AppData\Local\Temp\1015564001\T3V13WPgldPgYcsY.exe 24324⤵
- Executes dropped EXE
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\DKz22Y7NyxW9hbbl.exeC:\Users\Admin\AppData\Local\Temp\1015564001\DKz22Y7NyxW9hbbl.exe 24324⤵
- Executes dropped EXE
PID:2208
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\bBHplRrIBrqTTW6X.exeC:\Users\Admin\AppData\Local\Temp\1015564001\bBHplRrIBrqTTW6X.exe 24324⤵
- Executes dropped EXE
PID:1324
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\199zSopyRWfBuPAz.exeC:\Users\Admin\AppData\Local\Temp\1015564001\199zSopyRWfBuPAz.exe 24324⤵
- Executes dropped EXE
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\GV2tKWz0VKUONuIy.exeC:\Users\Admin\AppData\Local\Temp\1015564001\GV2tKWz0VKUONuIy.exe 24324⤵
- Executes dropped EXE
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\J5G3mEJSz74pEdE8.exeC:\Users\Admin\AppData\Local\Temp\1015564001\J5G3mEJSz74pEdE8.exe 24324⤵
- Executes dropped EXE
PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\THIdTiOqYsuzNBE4.exeC:\Users\Admin\AppData\Local\Temp\1015564001\THIdTiOqYsuzNBE4.exe 24324⤵
- Executes dropped EXE
PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\iXIPZNMuwOsJz7v2.exeC:\Users\Admin\AppData\Local\Temp\1015564001\iXIPZNMuwOsJz7v2.exe 24324⤵
- Executes dropped EXE
PID:2252
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\RSv87z1Jo4h8s4Yb.exeC:\Users\Admin\AppData\Local\Temp\1015564001\RSv87z1Jo4h8s4Yb.exe 24324⤵
- Executes dropped EXE
PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\jJlhVnVhOI0PjBln.exeC:\Users\Admin\AppData\Local\Temp\1015564001\jJlhVnVhOI0PjBln.exe 24324⤵
- Executes dropped EXE
PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\dpGxB2Smty5d6USt.exeC:\Users\Admin\AppData\Local\Temp\1015564001\dpGxB2Smty5d6USt.exe 24324⤵
- Executes dropped EXE
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\8RyjFHSJTzH2wsnK.exeC:\Users\Admin\AppData\Local\Temp\1015564001\8RyjFHSJTzH2wsnK.exe 24324⤵
- Executes dropped EXE
PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\Pjt7un2JTeqTZZzP.exeC:\Users\Admin\AppData\Local\Temp\1015564001\Pjt7un2JTeqTZZzP.exe 24324⤵
- Executes dropped EXE
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\CJEkYXZz4HH8GuSo.exeC:\Users\Admin\AppData\Local\Temp\1015564001\CJEkYXZz4HH8GuSo.exe 24324⤵
- Executes dropped EXE
PID:4260
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\KAHqzqR2rU9nX2eB.exeC:\Users\Admin\AppData\Local\Temp\1015564001\KAHqzqR2rU9nX2eB.exe 24324⤵
- Executes dropped EXE
PID:4288
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\a8xs4jlgsxI3FlDY.exeC:\Users\Admin\AppData\Local\Temp\1015564001\a8xs4jlgsxI3FlDY.exe 24324⤵
- Executes dropped EXE
PID:3928
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\NXJ7DpfbuYa5ATOv.exeC:\Users\Admin\AppData\Local\Temp\1015564001\NXJ7DpfbuYa5ATOv.exe 24324⤵
- Executes dropped EXE
PID:4624
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\JzmB1NZ2frhWyi2M.exeC:\Users\Admin\AppData\Local\Temp\1015564001\JzmB1NZ2frhWyi2M.exe 24324⤵
- Executes dropped EXE
PID:4020
-
-
C:\Users\Admin\AppData\Local\Temp\1015564001\Kwju9bSB4IR6J6jO.exeC:\Users\Admin\AppData\Local\Temp\1015564001\Kwju9bSB4IR6J6jO.exe 24324⤵
- Executes dropped EXE
PID:8160
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"C:\Users\Admin\AppData\Local\Temp\1015665001\IQ7ux2z.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\1015712001\ea8b4f148b.exe"C:\Users\Admin\AppData\Local\Temp\1015712001\ea8b4f148b.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\1015712001\ea8b4f148b.exe"C:\Users\Admin\AppData\Local\Temp\1015712001\ea8b4f148b.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032
-
-
-
C:\Users\Admin\AppData\Local\Temp\1015713001\5ec59fd910.exe"C:\Users\Admin\AppData\Local\Temp\1015713001\5ec59fd910.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\1015714001\b5a33b0a10.exe"C:\Users\Admin\AppData\Local\Temp\1015714001\b5a33b0a10.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\1015715001\17b2ba3f91.exe"C:\Users\Admin\AppData\Local\Temp\1015715001\17b2ba3f91.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244
-
-
C:\Users\Admin\AppData\Local\Temp\1015716001\61a6997f88.exe"C:\Users\Admin\AppData\Local\Temp\1015716001\61a6997f88.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:2560
-
-
C:\Users\Admin\AppData\Local\Temp\1015717001\c56c28b622.exe"C:\Users\Admin\AppData\Local\Temp\1015717001\c56c28b622.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\1015718001\f926adfd0f.exe"C:\Users\Admin\AppData\Local\Temp\1015718001\f926adfd0f.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4588
-
-
C:\Users\Admin\AppData\Local\Temp\1015720001\d02025e4de.exe"C:\Users\Admin\AppData\Local\Temp\1015720001\d02025e4de.exe"3⤵PID:4716
-
-
C:\Users\Admin\AppData\Local\Temp\1015719001\37c02a8756.exe"C:\Users\Admin\AppData\Local\Temp\1015719001\37c02a8756.exe"3⤵PID:4552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5c37a981bc24c4aba6454da4eecb7acbe
SHA12bffdf27d0d4f7c810e323c1671a87ed2d6b644f
SHA256d6fc121d54e4cdf3a1b6b0505c4f691f16d91fdd421bf96c04388b1c6f19e361
SHA5122f44b5218b323bc2bad3ee37426b5bbcbb089b1a561e5f2f48fd455fed0a395b50a6cbb3783bf06e25b144b3f77078629ab1d86fb2c8df1a532230c81a3b2ab8
-
Filesize
2.8MB
MD50dad190f420a0a09ed8c262ca18b1097
SHA1b97535bf2960278b19bda8cad9e885b8eefbdc85
SHA25629e1e95110c03e84720e213a2bb0dcdff95af85a8a894d71518e06c62131e64a
SHA5128ae92676fc5539899414f0a70cba1ed01685b30af9002c68114720d6a7213e4e9c2368e17717c4e3e02650781a022001e4a2e43f83afbd709e7f1ab81003b646
-
Filesize
710KB
MD528e568616a7b792cac1726deb77d9039
SHA139890a418fb391b823ed5084533e2e24dff021e1
SHA2569597798f7789adc29fbe97707b1bd8ca913c4d5861b0ad4fdd6b913af7c7a8e2
SHA51285048799e6d2756f1d6af77f34e6a1f454c48f2f43042927845931b7ecff2e5de45f864627a3d4aa061252401225bbb6c2caa8532320ccbe401e97c9c79ac8e5
-
Filesize
4.3MB
MD52cf432ad4974401192878777c4eca77f
SHA160328e8985166523803d1ca3ef6b096297293ca1
SHA256f9df15f08e2627ecc6bab7cc16b126f1168b438e394a3055bbe988f636c05728
SHA512e38a0afda98fa050503e6709e5742b7bb8ffe4a3c54c50d4f5d79f2b18b232581d017cea17bf42280291bfafa983901b333143a00c15c45e27ed9056919c78bd
-
Filesize
4.2MB
MD547c5e4a3bed4bc7223500ec9b9c6b9e9
SHA1b96067192682d3e8c62a6a9dc83ac3c3b6d4748c
SHA2568587e48579edd258b46d84531c4572d8b9a3e759903dd6c4960a9ec1eb8c712a
SHA5124249f68abd7e65ac07c0ac6b14bcb6596efdb41cbaeac0b35fd64bc4be9bdccad54bb1a97d4da789672e1306dce4dbe48f540344dd80dd1924dbd380e558d959
-
Filesize
384KB
MD5dfd5f78a711fa92337010ecc028470b4
SHA11a389091178f2be8ce486cd860de16263f8e902e
SHA256da96f2eb74e60de791961ef3800c36a5e12202fe97ae5d2fcfc1fe404bc13c0d
SHA512a3673074919039a2dc854b0f91d1e1a69724056594e33559741f53594e0f6e61e3d99ec664d541b17f09ffdebc2de1b042eec19ca8477fac86359c703f8c9656
-
Filesize
1.7MB
MD5594a65f3aa7257bf1e4e2dd7f0a02a0b
SHA1fb3efb442dd5537be5b5af2f19b30739de1e6e2d
SHA2560333e4430b0607e7359e7fd55f6a2ebce37c5f9272832d1871dc40f26c485b86
SHA512c3570d8ceeaa8ed37439bd0818fd9d5dc3ced911c5954151a7c704c742b10d903b7ae7eda7985b2cb0f88176e479abf7524245ebd56c82f1f8e74ba3d53c0720
-
Filesize
1.7MB
MD5ad76b8d853a4892463a4495cbac1dd65
SHA1cc943ad4f4008d98901ba2796c0a776b90afc7e8
SHA256677b6d0a8ca35c5f3be520f7cda4abd33bf77ad3cdfee4523147d139a4d6b8dd
SHA512d9eab40f017c0a08174b9df3d6d70eb6c15932af8f775eb912d8e22e6f28eb409870e7a13d1e9ab18fc60ce2d56a01cb659b57d3eb7ff99bc0a82a517bc76bb8
-
Filesize
948KB
MD58641003b7cea526077f35d24a49e5ffa
SHA100712deccd8540fb0c44b6d686dada62166c0965
SHA256cb58f7d4a9b5713ef8fafc5ec02ffe6941b10b6e3d31d0517b61347fe13d0c6a
SHA5127ff7272674afebd938aed4636f32ca4a98fb10fa8deb56bf273111736ce241400771580be6cfeb8313244687a55ad4468ac3aaf2d2de84a2aaf4e514f6e84421
-
Filesize
2.6MB
MD5a9c004901119508a4f4042b156ef56ab
SHA16539c6501a9a1cfe2ccb37d33d9c99b59b571bbf
SHA2560514281f4e4cee6002859acf202854e675dc3469c801230d2c222710cc9d397f
SHA51285215872a2797694f0e33bbdd6245a7d4213a033769509e5a01a7621d05fc21e61f5862c2cf6234649a927ab8874038a0990600b602406aab837c730f44a9bbb
-
Filesize
1.7MB
MD56c1d0dabe1ec5e928f27b3223f25c26b
SHA1e25ab704a6e9b3e4c30a6c1f7043598a13856ad9
SHA25692228a0012605351cf08df9a2ad4b93fa552d7a75991f81fb80f1ae854a0e57d
SHA5123a3f7af4f6018fcbd8c6f2871270504731cf269134453c9a146351c3e4a5c89165ecccafb3655d8b39c1ff1ec68f06e1851c0abd66d47602e1f0f8e36d4acfe9
-
Filesize
2.9MB
MD541e1b89657936a9f325d226251164e1b
SHA1de03b88abbdeb975e8aa2094a38bf98b7840f13b
SHA256ded5a181286b7bf7971993b0392ee15dec6d42f4b48f5356b3b89d9f2aed48d9
SHA512bd859efdd017b1fa470ad5b6eeb31b0cf782fc4182d48a4de31a8bdd693415af062ef0ac514ff36e0faa52125fc79cccb15f828fd1a9b7929d59b40b2dfa02e4