Analysis
-
max time kernel
43s -
max time network
62s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-12-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe
Resource
win7-20240903-en
Errors
General
-
Target
a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe
-
Size
2.9MB
-
MD5
c9624e4e0c6bbc83b57f844d1dc44102
-
SHA1
b0f8c247986305f8f1f83ea55bb04f6c748557ce
-
SHA256
a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb
-
SHA512
0417b2186a7f284a79016bd2cc473768293f2c262400439dac659b0a46cff82f72018f6fbbb3ba41b6d76eeff1f96110f8cd5c4739989dafb17942dd0e9a0d23
-
SSDEEP
49152:jyKdaGFwF6TL+v1ndNBCT8HlTxD/S8jeHAleOOOOOOOOOOOOOOOOOOOOOOOOOOOU:XdzFwFYLGbNBCT6lV0ll
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
xworm
xclient.fahrerscheinonlineholen.de:2489
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227
Extracted
lumma
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
hgzuiajogwnqs
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/dDuwSpUA
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb5-1280.dat family_xworm behavioral2/memory/1920-1294-0x0000000000FD0000-0x0000000000FEC000-memory.dmp family_xworm behavioral2/memory/1920-1468-0x000000001CE90000-0x000000001CEAC000-memory.dmp family_xworm -
Lumma family
-
resource yara_rule behavioral2/memory/1920-1471-0x000000001E6F0000-0x000000001E708000-memory.dmp VenomRAT -
Venomrat family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral2/memory/1920-1471-0x000000001E6F0000-0x000000001E708000-memory.dmp family_asyncrat -
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 16ef068384.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e3de37265a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 16ef068384.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 93 2124 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2028 powershell.exe 4972 powershell.exe 3936 powershell.exe 1244 powershell.exe 4004 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e3de37265a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 16ef068384.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e3de37265a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 16ef068384.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation vQeyqr1.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation WEX7mCI.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe -
Executes dropped EXE 13 IoCs
pid Process 5068 skotes.exe 4016 KDLBJP7.exe 1924 systemetape.exe 436 skotes.exe 4472 WEX7mCI.exe 1956 Gxtuum.exe 1920 vQeyqr1.exe 2488 e3de37265a.exe 1048 44502b04c3.exe 1340 44502b04c3.exe 3000 16ef068384.exe 4316 5fa038eeb8.exe 2560 9e8e68cf3b.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine e3de37265a.exe Key opened \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Software\Wine 16ef068384.exe -
Loads dropped DLL 1 IoCs
pid Process 2124 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" vQeyqr1.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 107 pastebin.com 108 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 ip-api.com -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 5068 skotes.exe 436 skotes.exe 2488 e3de37265a.exe 3000 16ef068384.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1048 set thread context of 1340 1048 44502b04c3.exe 112 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe File created C:\Windows\Tasks\Gxtuum.job WEX7mCI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 14 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5fa038eeb8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KDLBJP7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44502b04c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44502b04c3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16ef068384.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9e8e68cf3b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemetape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WEX7mCI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3de37265a.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1920 vQeyqr1.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 5068 skotes.exe 5068 skotes.exe 436 skotes.exe 436 skotes.exe 2488 e3de37265a.exe 2488 e3de37265a.exe 4004 powershell.exe 4004 powershell.exe 4004 powershell.exe 2028 powershell.exe 2028 powershell.exe 2028 powershell.exe 4972 powershell.exe 4972 powershell.exe 4972 powershell.exe 3936 powershell.exe 3936 powershell.exe 3936 powershell.exe 1920 vQeyqr1.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 3000 16ef068384.exe 4316 5fa038eeb8.exe 4316 5fa038eeb8.exe 2560 9e8e68cf3b.exe 2560 9e8e68cf3b.exe 1244 powershell.exe 1244 powershell.exe 1244 powershell.exe 4316 5fa038eeb8.exe 1920 vQeyqr1.exe 1920 vQeyqr1.exe 1920 vQeyqr1.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 1924 systemetape.exe Token: SeDebugPrivilege 1920 vQeyqr1.exe Token: SeDebugPrivilege 4004 powershell.exe Token: SeDebugPrivilege 2028 powershell.exe Token: SeDebugPrivilege 4972 powershell.exe Token: SeDebugPrivilege 3936 powershell.exe Token: SeDebugPrivilege 1920 vQeyqr1.exe Token: SeDebugPrivilege 2560 9e8e68cf3b.exe Token: SeDebugPrivilege 1244 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 4472 WEX7mCI.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1920 vQeyqr1.exe 1920 vQeyqr1.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 2972 wrote to memory of 5068 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 83 PID 2972 wrote to memory of 5068 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 83 PID 2972 wrote to memory of 5068 2972 a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe 83 PID 5068 wrote to memory of 4016 5068 skotes.exe 85 PID 5068 wrote to memory of 4016 5068 skotes.exe 85 PID 5068 wrote to memory of 4016 5068 skotes.exe 85 PID 5068 wrote to memory of 1924 5068 skotes.exe 86 PID 5068 wrote to memory of 1924 5068 skotes.exe 86 PID 5068 wrote to memory of 1924 5068 skotes.exe 86 PID 5068 wrote to memory of 4472 5068 skotes.exe 88 PID 5068 wrote to memory of 4472 5068 skotes.exe 88 PID 5068 wrote to memory of 4472 5068 skotes.exe 88 PID 4472 wrote to memory of 1956 4472 WEX7mCI.exe 89 PID 4472 wrote to memory of 1956 4472 WEX7mCI.exe 89 PID 4472 wrote to memory of 1956 4472 WEX7mCI.exe 89 PID 5068 wrote to memory of 1920 5068 skotes.exe 90 PID 5068 wrote to memory of 1920 5068 skotes.exe 90 PID 5068 wrote to memory of 2488 5068 skotes.exe 97 PID 5068 wrote to memory of 2488 5068 skotes.exe 97 PID 5068 wrote to memory of 2488 5068 skotes.exe 97 PID 1920 wrote to memory of 4004 1920 vQeyqr1.exe 98 PID 1920 wrote to memory of 4004 1920 vQeyqr1.exe 98 PID 1920 wrote to memory of 2028 1920 vQeyqr1.exe 102 PID 1920 wrote to memory of 2028 1920 vQeyqr1.exe 102 PID 1920 wrote to memory of 4972 1920 vQeyqr1.exe 104 PID 1920 wrote to memory of 4972 1920 vQeyqr1.exe 104 PID 1920 wrote to memory of 3936 1920 vQeyqr1.exe 106 PID 1920 wrote to memory of 3936 1920 vQeyqr1.exe 106 PID 5068 wrote to memory of 1048 5068 skotes.exe 108 PID 5068 wrote to memory of 1048 5068 skotes.exe 108 PID 5068 wrote to memory of 1048 5068 skotes.exe 108 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1048 wrote to memory of 1340 1048 44502b04c3.exe 112 PID 1920 wrote to memory of 1384 1920 vQeyqr1.exe 113 PID 1920 wrote to memory of 1384 1920 vQeyqr1.exe 113 PID 5068 wrote to memory of 3000 5068 skotes.exe 117 PID 5068 wrote to memory of 3000 5068 skotes.exe 117 PID 5068 wrote to memory of 3000 5068 skotes.exe 117 PID 1956 wrote to memory of 2124 1956 Gxtuum.exe 119 PID 1956 wrote to memory of 2124 1956 Gxtuum.exe 119 PID 1956 wrote to memory of 2124 1956 Gxtuum.exe 119 PID 5068 wrote to memory of 4316 5068 skotes.exe 120 PID 5068 wrote to memory of 4316 5068 skotes.exe 120 PID 5068 wrote to memory of 4316 5068 skotes.exe 120 PID 5068 wrote to memory of 2560 5068 skotes.exe 121 PID 5068 wrote to memory of 2560 5068 skotes.exe 121 PID 5068 wrote to memory of 2560 5068 skotes.exe 121 PID 2560 wrote to memory of 1244 2560 9e8e68cf3b.exe 123 PID 2560 wrote to memory of 1244 2560 9e8e68cf3b.exe 123 PID 2560 wrote to memory of 1244 2560 9e8e68cf3b.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe"C:\Users\Admin\AppData\Local\Temp\a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb_Sigmanly.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4016
-
-
C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1924
-
-
C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"3⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2028
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3936
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:1384
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019290001\e3de37265a.exe"C:\Users\Admin\AppData\Local\Temp\1019290001\e3de37265a.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe"C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe"C:\Users\Admin\AppData\Local\Temp\1019291001\44502b04c3.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019292001\16ef068384.exe"C:\Users\Admin\AppData\Local\Temp\1019292001\16ef068384.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\1019294001\5fa038eeb8.exe"C:\Users\Admin\AppData\Local\Temp\1019294001\5fa038eeb8.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Users\Admin\AppData\Local\Temp\1019295001\9e8e68cf3b.exe"C:\Users\Admin\AppData\Local\Temp\1019295001\9e8e68cf3b.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" Add-MpPreference -ExclusionPath "C:\obhgqahax"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1244
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:436
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD56d42b6da621e8df5674e26b799c8e2aa
SHA1ab3ce1327ea1eeedb987ec823d5e0cb146bafa48
SHA2565ab6a1726f425c6d0158f55eb8d81754ddedd51e651aa0a899a29b7a58619c4c
SHA51253faffbda8a835bc1143e894c118c15901a5fd09cfc2224dd2f754c06dc794897315049a579b9a8382d4564f071576045aaaf824019b7139d939152dca38ce29
-
Filesize
944B
MD5ef647504cf229a16d02de14a16241b90
SHA181480caca469857eb93c75d494828b81e124fda0
SHA25647002672443e80410e55a0b6d683573ac27d70d803b57ee3c2818d1008669710
SHA512a6d8c08c708eee6f7e700880ce79d2ba7cd0acbe8529d96e18f3e90ea1f3cf33fd801dd6eba6017cdd02769e968c48278c090c1deeac710124f79423cd862ee1
-
Filesize
944B
MD5aeceee3981c528bdc5e1c635b65d223d
SHA1de9939ed37edca6772f5cdd29f6a973b36b7d31b
SHA256b99f3c778a047e0348c92c16e0419fa29418d10d0fec61ad8283e92a094a2b32
SHA512df48285f38e9284efdbd9f8d99e2e94a46fb5465953421ab88497b73ae06895b98ea5c98796560810a6f342c31a9112ea87e03cd3e267fd8518d7585f492a8fb
-
Filesize
944B
MD58f780dca0550631f78b5b0ca243c93c1
SHA1b8f314ee71465fac9eba4a9578e65a1fa0589514
SHA256d000d5e4ea02edb0cc57c613887a5365a10567cceba59ee11c8ebf3c19dc21c2
SHA51269ca4029da3b85410d3292d21960c097acb63367ed77f984cf768921c841dbade0d9a761f087da2c2e1bb56702094cafca43bbb72aba608fc7237452bf6d1e50
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
1.2MB
MD5545b933cac5def6ec43ca2cb6eac9d8e
SHA1f2740a1062032cc280d54c4cfe6a1ff3c6ce1c76
SHA256efce8cc629bb9f443613c7ec97b65020b514b9ee497d472ef24fed21bceb86c4
SHA512f4853f10933edbf7df0ca6138bb423e5dfb18cf6431068a776a0c53ea226f176d263b9514066b88861360b161ba922b618f306f1936a95e1071fc70926418caa
-
Filesize
429KB
MD551ff79b406cb223dd49dd4c947ec97b0
SHA1b9b0253480a1b6cbdd673383320fecae5efb3dce
SHA2562e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e
SHA512c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c
-
Filesize
88KB
MD507e410214a2aeb8f577e407154252f3c
SHA1697fac558b66c0476c3f04d80764fa75eb6de77d
SHA25612e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114
SHA512470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc
-
Filesize
1.8MB
MD527c1f96d7e1b72b6817b6efeff037f90
SHA12972cc112fc7e20cbf5952abe07407b8c1fbb2a2
SHA256aec3ec473de321d123e939985579227ee62b53b3b3edb7ab96e2a66c17e9696d
SHA5129a31dc9945889d35aea8710df2f42806c72c422b7b5f4aa8acba6986cbd9ea6a49181a41a50ee21ccbed86cbff87c98a742e681ac3f6a87e2bd4436c9112eb32
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
4.2MB
MD5de977c9c79ceebdf86d4cb38408d7ce4
SHA12ffb19e7bc8109bb8033c1d6e25f4ae2fe49b3c6
SHA256ad3fb64aaa0680e21de914b77e3502a6c82860f333fa3d2415cb9a7a93b9b893
SHA51219067b298995a405ac3768b6586cd456598af7a9703551eccb1caf8c30c1e126abf9d4f80001f1fcd1c201dd0cf30f99cdd77ef5b5e2feffbcdd7887e29932b0
-
Filesize
1.3MB
MD5669ed3665495a4a52029ff680ec8eba9
SHA17785e285365a141e307931ca4c4ef00b7ecc8986
SHA2562d2d405409b128eea72a496ccff0ed56f9ed87ee2564ae4815b4b116d4fb74d6
SHA512bedc8f7c1894fc64cdd00ebc58b434b7d931e52c198a0fa55f16f4e3d44a7dc4643eaa78ec55a43cc360571345cd71d91a64037a135663e72eed334fe77a21e6
-
Filesize
21KB
MD504f57c6fb2b2cd8dcc4b38e4a93d4366
SHA161770495aa18d480f70b654d1f57998e5bd8c885
SHA25651e4d0cbc184b8abfa6d84e219317cf81bd542286a7cc602c87eb703a39627c2
SHA51253f95e98a5eca472ed6b1dfd6fecd1e28ea66967a1b3aa109fe911dbb935f1abf327438d4b2fe72cf7a0201281e9f56f4548f965b96e3916b9142257627e6ccd
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.9MB
MD5c9624e4e0c6bbc83b57f844d1dc44102
SHA1b0f8c247986305f8f1f83ea55bb04f6c748557ce
SHA256a7a661cf43d7129a809901c641998089aff10f97a09bbdf5874ba16c01db5dfb
SHA5120417b2186a7f284a79016bd2cc473768293f2c262400439dac659b0a46cff82f72018f6fbbb3ba41b6d76eeff1f96110f8cd5c4739989dafb17942dd0e9a0d23
-
Filesize
124KB
MD57fe5b933ed9391ea24647479c80e904e
SHA1963721e46b8056e2e883c598e95d7daa7bdf8d9b
SHA2562e12355cb9b11c923dc06f195399d678bc46680e982856d9405f64e7563fe8b3
SHA51282d92d0c5155fff5ce97099cb9e78422ff328e0c516fbab7634e624215366c2191ec6ff6fe8d939268275c6770accb208af7ac69c3cc13c9188a49ef41339bb0