Analysis
-
max time kernel
42s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-12-2024 11:13
Static task
static1
General
-
Target
file.exe
-
Size
2.8MB
-
MD5
76c2f75bf3efb5964c432f7661d22d58
-
SHA1
521badd0c5d9f85986a7845b3163b82b87c0589d
-
SHA256
939310706200640f603a1fb3e6528c3a4bafa87e0d610e817a7824cf2e089bc7
-
SHA512
e9462f252fdb9f4591b0b96a97cee084e88299c066b7d1d0e862bc9b78fed2e1159d91fc74fa906f0b942f36560fffda2dc49dd059e48dc309489c9047955e51
-
SSDEEP
49152:GcUejriX8cBywn04rFnpO3vNcDmq//ICH44JTD8K6QlO:GcUejrk8cANeDO3lamggM441De
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
5.12
d5db2d
http://212.193.31.8
-
install_dir
e458d263c0
-
install_file
Gxtuum.exe
-
strings_key
0e18a2a9dd22cd0f87c9fba7075c3b39
-
url_paths
/3ofn3jf3e2ljk2/index.php
Extracted
xworm
xclient.fahrerscheinonlineholen.de:2489
-
Install_directory
%AppData%
-
install_file
XClient.exe
-
telegram
https://api.telegram.org/bot8174428401:AAHxlGtOg4tsy0J0kYm7h8822BuHfnk8vKQ/sendMessage?chat_id=1434988227
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
lumma
Extracted
asyncrat
Venom RAT + HVNC + Stealer + Grabber v6.0.3
Default
hgzuiajogwnqs
-
delay
1
-
install
false
-
install_folder
%AppData%
-
pastebin_config
https://pastebin.com/raw/dDuwSpUA
Signatures
-
Amadey family
-
Asyncrat family
-
Detect Xworm Payload 3 IoCs
resource yara_rule behavioral1/files/0x0005000000019244-1266.dat family_xworm behavioral1/memory/628-1275-0x0000000000360000-0x000000000037C000-memory.dmp family_xworm behavioral1/memory/628-1597-0x000000001A8B0000-0x000000001A8CC000-memory.dmp family_xworm -
Lumma family
-
Stealc family
-
Xworm family
-
Async RAT payload 1 IoCs
resource yara_rule behavioral1/memory/628-1592-0x000000001A810000-0x000000001A828000-memory.dmp family_asyncrat -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a1600af010.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8b03cf3ea5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 397181413d.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 44 1744 rundll32.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1584 powershell.exe 2068 powershell.exe 3000 powershell.exe 1888 powershell.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a1600af010.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8b03cf3ea5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 397181413d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 397181413d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a1600af010.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8b03cf3ea5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk vQeyqr1.exe -
Executes dropped EXE 10 IoCs
pid Process 2868 skotes.exe 1928 KDLBJP7.exe 2724 systemetape.exe 1660 WEX7mCI.exe 328 Gxtuum.exe 628 vQeyqr1.exe 1600 a1600af010.exe 2060 8b03cf3ea5.exe 1152 5ddc9415f3.exe 1716 397181413d.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine a1600af010.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 8b03cf3ea5.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 397181413d.exe -
Loads dropped DLL 17 IoCs
pid Process 1872 file.exe 2868 skotes.exe 2868 skotes.exe 2868 skotes.exe 1660 WEX7mCI.exe 2868 skotes.exe 2868 skotes.exe 2868 skotes.exe 2868 skotes.exe 2868 skotes.exe 2868 skotes.exe 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 1744 rundll32.exe 2868 skotes.exe 2868 skotes.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\a1600af010.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019311001\\a1600af010.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\XClient = "C:\\Users\\Admin\\AppData\\Roaming\\XClient.exe" vQeyqr1.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\8b03cf3ea5.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019312001\\8b03cf3ea5.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\5ddc9415f3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019313001\\5ddc9415f3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\397181413d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1019314001\\397181413d.exe" skotes.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 126 pastebin.com 127 pastebin.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 10 ip-api.com -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0005000000019423-1356.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1872 file.exe 2868 skotes.exe 1600 a1600af010.exe 2060 8b03cf3ea5.exe 1716 397181413d.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Tasks\Gxtuum.job WEX7mCI.exe File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systemetape.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1600af010.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5ddc9415f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 5ddc9415f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 397181413d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WEX7mCI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b03cf3ea5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 5ddc9415f3.exe -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe -
Kills process with taskkill 5 IoCs
pid Process 848 taskkill.exe 1536 taskkill.exe 916 taskkill.exe 1048 taskkill.exe 2532 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000_Classes\Local Settings firefox.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 a1600af010.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 a1600af010.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 a1600af010.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2568 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 628 vQeyqr1.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1872 file.exe 2868 skotes.exe 1888 powershell.exe 1600 a1600af010.exe 1584 powershell.exe 2068 powershell.exe 3000 powershell.exe 628 vQeyqr1.exe 2060 8b03cf3ea5.exe 1152 5ddc9415f3.exe 1716 397181413d.exe 1152 5ddc9415f3.exe 1716 397181413d.exe 1716 397181413d.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
description pid Process Token: SeDebugPrivilege 2724 systemetape.exe Token: SeDebugPrivilege 628 vQeyqr1.exe Token: SeDebugPrivilege 1888 powershell.exe Token: SeDebugPrivilege 1584 powershell.exe Token: SeDebugPrivilege 2068 powershell.exe Token: SeDebugPrivilege 3000 powershell.exe Token: SeDebugPrivilege 628 vQeyqr1.exe Token: SeDebugPrivilege 848 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 1048 taskkill.exe Token: SeDebugPrivilege 2532 taskkill.exe Token: SeDebugPrivilege 2344 firefox.exe Token: SeDebugPrivilege 2344 firefox.exe Token: SeDebugPrivilege 1716 397181413d.exe -
Suspicious use of FindShellTrayWindow 17 IoCs
pid Process 1872 file.exe 1660 WEX7mCI.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 2344 firefox.exe 2344 firefox.exe 2344 firefox.exe 2344 firefox.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 2344 firefox.exe 2344 firefox.exe 2344 firefox.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe 1152 5ddc9415f3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 628 vQeyqr1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2868 1872 file.exe 30 PID 1872 wrote to memory of 2868 1872 file.exe 30 PID 1872 wrote to memory of 2868 1872 file.exe 30 PID 1872 wrote to memory of 2868 1872 file.exe 30 PID 2868 wrote to memory of 1928 2868 skotes.exe 33 PID 2868 wrote to memory of 1928 2868 skotes.exe 33 PID 2868 wrote to memory of 1928 2868 skotes.exe 33 PID 2868 wrote to memory of 1928 2868 skotes.exe 33 PID 2868 wrote to memory of 2724 2868 skotes.exe 34 PID 2868 wrote to memory of 2724 2868 skotes.exe 34 PID 2868 wrote to memory of 2724 2868 skotes.exe 34 PID 2868 wrote to memory of 2724 2868 skotes.exe 34 PID 2868 wrote to memory of 1660 2868 skotes.exe 35 PID 2868 wrote to memory of 1660 2868 skotes.exe 35 PID 2868 wrote to memory of 1660 2868 skotes.exe 35 PID 2868 wrote to memory of 1660 2868 skotes.exe 35 PID 1660 wrote to memory of 328 1660 WEX7mCI.exe 36 PID 1660 wrote to memory of 328 1660 WEX7mCI.exe 36 PID 1660 wrote to memory of 328 1660 WEX7mCI.exe 36 PID 1660 wrote to memory of 328 1660 WEX7mCI.exe 36 PID 2868 wrote to memory of 628 2868 skotes.exe 37 PID 2868 wrote to memory of 628 2868 skotes.exe 37 PID 2868 wrote to memory of 628 2868 skotes.exe 37 PID 2868 wrote to memory of 628 2868 skotes.exe 37 PID 628 wrote to memory of 1888 628 vQeyqr1.exe 39 PID 628 wrote to memory of 1888 628 vQeyqr1.exe 39 PID 628 wrote to memory of 1888 628 vQeyqr1.exe 39 PID 2868 wrote to memory of 1600 2868 skotes.exe 41 PID 2868 wrote to memory of 1600 2868 skotes.exe 41 PID 2868 wrote to memory of 1600 2868 skotes.exe 41 PID 2868 wrote to memory of 1600 2868 skotes.exe 41 PID 628 wrote to memory of 1584 628 vQeyqr1.exe 43 PID 628 wrote to memory of 1584 628 vQeyqr1.exe 43 PID 628 wrote to memory of 1584 628 vQeyqr1.exe 43 PID 628 wrote to memory of 2068 628 vQeyqr1.exe 45 PID 628 wrote to memory of 2068 628 vQeyqr1.exe 45 PID 628 wrote to memory of 2068 628 vQeyqr1.exe 45 PID 628 wrote to memory of 3000 628 vQeyqr1.exe 47 PID 628 wrote to memory of 3000 628 vQeyqr1.exe 47 PID 628 wrote to memory of 3000 628 vQeyqr1.exe 47 PID 628 wrote to memory of 2568 628 vQeyqr1.exe 49 PID 628 wrote to memory of 2568 628 vQeyqr1.exe 49 PID 628 wrote to memory of 2568 628 vQeyqr1.exe 49 PID 2868 wrote to memory of 2060 2868 skotes.exe 51 PID 2868 wrote to memory of 2060 2868 skotes.exe 51 PID 2868 wrote to memory of 2060 2868 skotes.exe 51 PID 2868 wrote to memory of 2060 2868 skotes.exe 51 PID 2868 wrote to memory of 1152 2868 skotes.exe 52 PID 2868 wrote to memory of 1152 2868 skotes.exe 52 PID 2868 wrote to memory of 1152 2868 skotes.exe 52 PID 2868 wrote to memory of 1152 2868 skotes.exe 52 PID 1152 wrote to memory of 848 1152 5ddc9415f3.exe 53 PID 1152 wrote to memory of 848 1152 5ddc9415f3.exe 53 PID 1152 wrote to memory of 848 1152 5ddc9415f3.exe 53 PID 1152 wrote to memory of 848 1152 5ddc9415f3.exe 53 PID 1152 wrote to memory of 1536 1152 5ddc9415f3.exe 55 PID 1152 wrote to memory of 1536 1152 5ddc9415f3.exe 55 PID 1152 wrote to memory of 1536 1152 5ddc9415f3.exe 55 PID 1152 wrote to memory of 1536 1152 5ddc9415f3.exe 55 PID 1152 wrote to memory of 916 1152 5ddc9415f3.exe 57 PID 1152 wrote to memory of 916 1152 5ddc9415f3.exe 57 PID 1152 wrote to memory of 916 1152 5ddc9415f3.exe 57 PID 1152 wrote to memory of 916 1152 5ddc9415f3.exe 57 PID 1152 wrote to memory of 1048 1152 5ddc9415f3.exe 59 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"C:\Users\Admin\AppData\Local\Temp\1018586001\KDLBJP7.exe"3⤵
- Executes dropped EXE
PID:1928
-
-
C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"C:\Users\Admin\AppData\Local\Temp\1018676001\systemetape.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"C:\Users\Admin\AppData\Local\Temp\1018833001\WEX7mCI.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\e458d263c0\Gxtuum.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:328 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Admin\AppData\Roaming\48cb35e3030a2b\clip64.dll, Main5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1018897001\vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'vQeyqr1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1584
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'XClient.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "XClient" /tr "C:\Users\Admin\AppData\Roaming\XClient.exe"4⤵
- Scheduled Task/Job: Scheduled Task
PID:2568
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019311001\a1600af010.exe"C:\Users\Admin\AppData\Local\Temp\1019311001\a1600af010.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1600
-
-
C:\Users\Admin\AppData\Local\Temp\1019312001\8b03cf3ea5.exe"C:\Users\Admin\AppData\Local\Temp\1019312001\8b03cf3ea5.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2060
-
-
C:\Users\Admin\AppData\Local\Temp\1019313001\5ddc9415f3.exe"C:\Users\Admin\AppData\Local\Temp\1019313001\5ddc9415f3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:108
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2344 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.0.1043321534\800340645" -parentBuildID 20221007134813 -prefsHandle 1244 -prefMapHandle 1236 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {c55085d9-2356-4155-be7d-328c174f77c9} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 1332 106d6b58 gpu6⤵PID:2524
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.1.1037602703\696430570" -parentBuildID 20221007134813 -prefsHandle 1536 -prefMapHandle 1532 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8398a1a4-76a3-40fc-93b0-d44b8fab8c74} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 1548 f4eb558 socket6⤵PID:2736
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.2.2042377034\1997423445" -childID 1 -isForBrowser -prefsHandle 1968 -prefMapHandle 1964 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {74a3c62b-472c-427e-9394-e9d88021ddd8} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 2000 1065f158 tab6⤵PID:2096
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.3.1321080278\570791553" -childID 2 -isForBrowser -prefsHandle 2620 -prefMapHandle 2616 -prefsLen 26151 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1e82ba24-54f2-4e64-ab64-58395b60f50c} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 2636 e5fc58 tab6⤵PID:1256
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.4.338108986\1260960734" -childID 3 -isForBrowser -prefsHandle 3648 -prefMapHandle 3624 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {1694d244-1fce-4ed2-978c-a276a50a2472} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 3660 1ecf8e58 tab6⤵PID:3364
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.5.1469247502\417249430" -childID 4 -isForBrowser -prefsHandle 3784 -prefMapHandle 3788 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {d584064b-0eeb-4369-8c0e-68f3d3aaacb4} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 3776 1ecfa658 tab6⤵PID:3372
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2344.6.1944299746\1748047627" -childID 5 -isForBrowser -prefsHandle 3932 -prefMapHandle 3936 -prefsLen 26351 -prefMapSize 233444 -jsInitHandle 568 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {f3c133c0-9e03-4b46-a87b-3d120449a62a} 2344 "\\.\pipe\gecko-crash-server-pipe.2344" 3692 1ecfac58 tab6⤵PID:3408
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1019314001\397181413d.exe"C:\Users\Admin\AppData\Local\Temp\1019314001\397181413d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\1019315001\6d676c83a2.exe"C:\Users\Admin\AppData\Local\Temp\1019315001\6d676c83a2.exe"3⤵PID:964
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
1.2MB
MD5545b933cac5def6ec43ca2cb6eac9d8e
SHA1f2740a1062032cc280d54c4cfe6a1ff3c6ce1c76
SHA256efce8cc629bb9f443613c7ec97b65020b514b9ee497d472ef24fed21bceb86c4
SHA512f4853f10933edbf7df0ca6138bb423e5dfb18cf6431068a776a0c53ea226f176d263b9514066b88861360b161ba922b618f306f1936a95e1071fc70926418caa
-
Filesize
429KB
MD551ff79b406cb223dd49dd4c947ec97b0
SHA1b9b0253480a1b6cbdd673383320fecae5efb3dce
SHA2562e3a5dfa44d59681a60d78b8b08a1af3878d8e270c02d7e31a0876a85eb42a7e
SHA512c2b8d15b0dc1b0846f39ce007be2deb41d5b6ae76af90d618f29da8691ed987c42f3c270f0ea7f4d10cbd2d3877118f4133803c9c965b6ff236ff8cfafd9367c
-
Filesize
88KB
MD507e410214a2aeb8f577e407154252f3c
SHA1697fac558b66c0476c3f04d80764fa75eb6de77d
SHA25612e340e551abbf8a61a6dd73d45c94e88aa217ceae070ba0748360d24c706114
SHA512470b208122d6177e4635038418e4966a63725c7f9b21b4d41f3c89b953bae9a23e141424b358110de3a8d1624c125224a7471bb44ef7039c313d03e844a20ecc
-
Filesize
1.8MB
MD53a57d7b29d649f2cff4dad5fb12e3db8
SHA1fe28c4f877d653121be505f83e68c8471d0880d3
SHA25660206d6ebc7b429c88c0c176a1a65951d986aa7702ca469a08c2f04579801c8e
SHA5121ce68b9ba62dd54d99c1454e160d42dad4afefc7c46a63696a76f4359159be31d64ee2f1f622e68c64024c728ed3d919ae0c65c82f09ab3cf48ca8d16dc6b6ac
-
Filesize
2.7MB
MD59e1a015a00b2699812aedac1ea4e6060
SHA1d3236de3ec97a7cbe724aa5de47ab27ac72f5bdc
SHA256fad1e054eb8f33990d2a36b413323688a60c36eeb7cd1c6816de7160d827ff4c
SHA512086add1bcf765419313e1aaf57fe5fd117bff6295e662da04803ea0ed50756aaada1ffa529a818ff4fdcf07c3c4801d5608143a3c5b48135fa3a670704c9a079
-
Filesize
950KB
MD5ff65cdcec1a74a811b7d5eff45eac5a7
SHA17d3aa480ff46f8d967b1e53e4043118dcdafe40b
SHA256db3a6696ac07c977613a2c6fa7d94c08fc9e7020c8e16370da31a6f4bbbc7702
SHA512fbed023e71596510609fdf6565f0c618d3fc6daf3256dc460b7e35cafc09d3f9648421876864e0f5681c4b17b9d1cf3ae10c755626a142d8dcad408508b72539
-
Filesize
2.7MB
MD552af280ee5567af82852e91966b07fb6
SHA1a4185834bebf39b2c49015118ce3ff951abcf458
SHA256f7aeb1deb13256554ea4dfd702ccbbadff4ff20c72aa594d741c9b5238c1c024
SHA512a85a125ec61509c4de344cc6785780a3a75646666df0490e308cccd521b80c559d3b832c3ecd2aea49256e051aa76d05fa1b8784e0a70527a666d3b28efe6500
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2.8MB
MD576c2f75bf3efb5964c432f7661d22d58
SHA1521badd0c5d9f85986a7845b3163b82b87c0589d
SHA256939310706200640f603a1fb3e6528c3a4bafa87e0d610e817a7824cf2e089bc7
SHA512e9462f252fdb9f4591b0b96a97cee084e88299c066b7d1d0e862bc9b78fed2e1159d91fc74fa906f0b942f36560fffda2dc49dd059e48dc309489c9047955e51
-
Filesize
124KB
MD57fe5b933ed9391ea24647479c80e904e
SHA1963721e46b8056e2e883c598e95d7daa7bdf8d9b
SHA2562e12355cb9b11c923dc06f195399d678bc46680e982856d9405f64e7563fe8b3
SHA51282d92d0c5155fff5ce97099cb9e78422ff328e0c516fbab7634e624215366c2191ec6ff6fe8d939268275c6770accb208af7ac69c3cc13c9188a49ef41339bb0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UB99F4T8FQ9511TWOX05.temp
Filesize7KB
MD549407d557857065b3055dba4c3a5b4c3
SHA17c936563739d867d8ced8292e628bedfea1c8dc5
SHA25643ad91149ce3e247d19e45198c6fd2bed14ab8831d46f04f87223da7e1131a0a
SHA51229319efa9455c2a85e4b7619d0f7deb385d19a0294c955a8f3e2e0db4ecd1b6e1ab3ca99d429740b46f940c5795abf7f5279dc7e72296072adb5354e67e3b25c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD52db14f61ce467eae55f06cdc8c8d2ac6
SHA18df3aff3b59da880c4c7e16bb5ff4b06bd3e33c9
SHA2567e9eb7e9a0fc7ed44e4bf999f0bcc5ee804067711ac81cd3ead046d5b11aed66
SHA512b8406875b6ffaf0c745e415f34b2c38025065825c7b56a71e70f38616c1e64bcb3345bafc74aa95d6d9cecb58af8b255fe0984369791ad107d95198a9b12003e
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\1802e5e4-52da-4c7c-83f0-0b1fc82e01e4
Filesize11KB
MD55b3b630bd12761fd934dd23861ce70d6
SHA10696092463419f57bf076614a4bee8922343adb1
SHA2565a6991c3376ac22baa89cd833bda2a01bb33554b9bd4981b9085cf4f74d32c3e
SHA5124ace4c65cab3f6b8d469f6ff3fae2f6bb8e6913fbc10e0c67628637c8f86da2cdd6cc7e8377af66b737f4bd759709997cae911ec18300de1f79bff10c14bbd2b
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\5nwvfgbl.default-release\datareporting\glean\pending_pings\ce081e1b-5c7f-4f1d-90a5-7ea524efd149
Filesize745B
MD5fc4aad5153eff9fc138a16a1ff4f5061
SHA1a3a71a4aa57bd6df8ad15f08a2ef5aca34ca9eb5
SHA256ecc9cf5972b0d961aa6185f01b864aa9d5a2697193e58575bfcc7afe67926217
SHA512ed786aec490ef07917584ad4c83de585b34f1ab016f52532a86bed97af1acb4e253af9fc2a3929770328fffa3dfb00f46202ff38cb3c3adc0731e7cadb939d92
-
Filesize
6KB
MD5090ca23bd8d3d1125cba947e32643200
SHA1066ad2d2ad243d0f8aed9daf1dc94ff3bfb69423
SHA2565f9cb8761b58f65f2fad11be75fd3ed7642d1d61beef40821efcad97174c27ad
SHA5125f6aeddd60caf918924f402cf29f9cb0bac8bca9ef8f666966306f0e49f4a264ecddf4f426dfebf231da81b5d76d1a704e20f4c0351262035e45a50586e3897b
-
Filesize
6KB
MD5b5ca49c840bff1c53d72dda05f574a93
SHA142ec734e1d1dfed4c41c752ce9b8dedb587bc6b3
SHA2567c898c284f5ae6d3359062611a40f7efc513f3da1989c4b313d295afcb056c46
SHA51242bc4394c8bb0ab146f85500cf6a178867c27b3c44d9a504d4d2772639d097e22427c9fe88655c084a58515f533126b43f6d433e5670f95dfaea6dc3da706d18