Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:27
Static task
static1
Behavioral task
behavioral1
Sample
3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe
Resource
win10v2004-20241007-en
General
-
Target
3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe
-
Size
3.1MB
-
MD5
cf6393e173fb6315d0c681bc78eb3528
-
SHA1
26dc307ae4ea1866d40c9a34e38768733ec30b34
-
SHA256
3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d
-
SHA512
47e722c9f4736faf9612aff748cb4e1211e00ffe0fe56a65dc0dbec07f7b5e81908269d7c31066250866f3459727874d88c27fa88be08e540d0eb1e048ced61f
-
SSDEEP
24576:O/Nvd7MjWuH7NZRmw3vb+VBi7cCgTUvRS6r0EexLRdno+gSMW7GQJKTJjmX0/4hH:kliWo533j+na3bJrGYnlCJMdPS/b
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
Extracted
redline
1488Traffer
147.45.44.224:1912
Extracted
stealc
stok
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
cryptbot
Signatures
-
Amadey family
-
Cryptbot family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection 6ec085ef1c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 6ec085ef1c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 6ec085ef1c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 6ec085ef1c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 6ec085ef1c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 6ec085ef1c.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/files/0x0007000000004e74-83.dat family_redline behavioral1/memory/1744-85-0x00000000000B0000-0x0000000000102000-memory.dmp family_redline behavioral1/memory/3436-1043-0x0000000000180000-0x00000000001D2000-memory.dmp family_redline -
Redline family
-
Stealc family
-
Enumerates VirtualBox registry keys 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VBoxSF 13ba0b14b2.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 9 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3b490692a6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 9c17f6af59.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 935dbc58b6.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 13ba0b14b2.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5e71784db4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ f74a883743.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 6ec085ef1c.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell and hide display window.
pid Process 1548 powershell.exe 3236 powershell.exe -
Downloads MZ/PE file
-
Uses browser remote debugging 2 TTPs 5 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2776 chrome.exe 2076 chrome.exe 3516 chrome.exe 912 chrome.exe 2068 chrome.exe -
Checks BIOS information in registry 2 TTPs 18 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5e71784db4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 9c17f6af59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 9c17f6af59.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 935dbc58b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 6ec085ef1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3b490692a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 13ba0b14b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f74a883743.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 6ec085ef1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 13ba0b14b2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3b490692a6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 935dbc58b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5e71784db4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f74a883743.exe -
Executes dropped EXE 39 IoCs
pid Process 2804 skotes.exe 2776 I0XmI2t.exe 1264 mdjw5me.exe 2028 mdjw5me.exe 2908 mdjw5me.exe 1744 DJj.exe 532 client.exe 1944 client.exe 1940 c800a97d7f.exe 2932 c800a97d7f.exe 2972 c800a97d7f.exe 2976 c800a97d7f.exe 2184 c800a97d7f.exe 1548 c800a97d7f.exe 2776 c800a97d7f.exe 1184 Process not Found 2120 3b490692a6.exe 1912 bb3083d181.exe 832 7z.exe 2096 7z.exe 2516 7z.exe 1432 9c17f6af59.exe 2876 7z.exe 1016 7z.exe 2592 7z.exe 1620 7z.exe 2032 7z.exe 2892 in.exe 1368 935dbc58b6.exe 1028 24c72886f3.exe 2520 6ec085ef1c.exe 3592 dbc692a428.exe 3932 a363a99195.exe 4016 graph.exe 3436 DJj.exe 3648 13ba0b14b2.exe 1340 5e71784db4.exe 2960 f74a883743.exe 3504 a34ea5c0f0.exe -
Identifies Wine through registry keys 2 TTPs 9 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 6ec085ef1c.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 13ba0b14b2.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine f74a883743.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 3b490692a6.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 935dbc58b6.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 9c17f6af59.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 5e71784db4.exe -
Loads dropped DLL 60 IoCs
pid Process 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 1264 mdjw5me.exe 1264 mdjw5me.exe 2804 skotes.exe 532 client.exe 1944 client.exe 2804 skotes.exe 2804 skotes.exe 1940 c800a97d7f.exe 1940 c800a97d7f.exe 1940 c800a97d7f.exe 1940 c800a97d7f.exe 1940 c800a97d7f.exe 1940 c800a97d7f.exe 1184 Process not Found 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2852 cmd.exe 832 7z.exe 2852 cmd.exe 2096 7z.exe 2852 cmd.exe 2516 7z.exe 2804 skotes.exe 2804 skotes.exe 2852 cmd.exe 2876 7z.exe 2852 cmd.exe 1016 7z.exe 2852 cmd.exe 2592 7z.exe 2852 cmd.exe 1620 7z.exe 2852 cmd.exe 2032 7z.exe 2852 cmd.exe 2852 cmd.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 3592 dbc692a428.exe 1368 935dbc58b6.exe 1368 935dbc58b6.exe 3540 WerFault.exe 3540 WerFault.exe 3540 WerFault.exe 3540 WerFault.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe 2804 skotes.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 6ec085ef1c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features 6ec085ef1c.exe -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\9c17f6af59.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021163001\\9c17f6af59.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\935dbc58b6.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021164001\\935dbc58b6.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\24c72886f3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021165001\\24c72886f3.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\6ec085ef1c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1021166001\\6ec085ef1c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Graph = "C:\\Program Files\\Windows Media Player\\graph\\graph.exe" dbc692a428.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 146 drive.google.com 147 drive.google.com -
Looks up external IP address via web service 2 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 159 ipinfo.io 158 ipinfo.io -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000019cfc-511.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
pid Process 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 2804 skotes.exe 2120 3b490692a6.exe 1432 9c17f6af59.exe 1368 935dbc58b6.exe 2520 6ec085ef1c.exe 3648 13ba0b14b2.exe 1340 5e71784db4.exe 2960 f74a883743.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1264 set thread context of 2908 1264 mdjw5me.exe 39 PID 1940 set thread context of 2776 1940 c800a97d7f.exe 51 -
resource yara_rule behavioral1/memory/2892-478-0x000000013F630000-0x000000013FAC0000-memory.dmp upx behavioral1/memory/2892-480-0x000000013F630000-0x000000013FAC0000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dbc692a428.exe File created C:\Program Files\Windows Media Player\graph\graph.exe dbc692a428.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5fzip dbc692a428.exe File opened for modification C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dbc692a428.exe File created C:\Program Files\Windows Media Player\1w4lv5IzuEVOMa3sjCc6orj2dWPvJoK5f dbc692a428.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3540 1368 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e71784db4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bb3083d181.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9c17f6af59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language 24c72886f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjw5me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 935dbc58b6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 24c72886f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DJj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c800a97d7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c800a97d7f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b490692a6.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Nls\Language\InstallLanguage 24c72886f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mdjw5me.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 13ba0b14b2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ec085ef1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DJj.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1748 PING.EXE 2976 powershell.exe -
Checks processor information in registry 2 TTPs 8 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Signature firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Update Revision firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\CurrentPatchLevel firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~Mhz firefox.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier firefox.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 935dbc58b6.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 935dbc58b6.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Kills process with taskkill 5 IoCs
pid Process 2328 taskkill.exe 1128 taskkill.exe 2580 taskkill.exe 1600 taskkill.exe 2520 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings firefox.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 mdjw5me.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mdjw5me.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 mdjw5me.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 c800a97d7f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 040000000100000010000000d474de575c39b2d39c8583c5c065498a0f0000000100000014000000e35ef08d884f0a0ade2f75e96301ce6230f213a8090000000100000034000000303206082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b060105050703085300000001000000230000003021301f06096086480186fd6c020130123010060a2b0601040182373c0101030200c0140000000100000014000000b13ec36903f8bf4701d498261a0802ef63642bc30b00000001000000120000004400690067006900430065007200740000001d00000001000000100000008f76b981d528ad4770088245e2031b630300000001000000140000005fb7ee0633e259dbad0c4c9ae6d38f1a61c7dc25190000000100000010000000ba4f3972e7aed9dccdc210db59da13c92000000001000000c9030000308203c5308202ada003020102021002ac5c266a0b409b8f0b79f2ae462577300d06092a864886f70d0101050500306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f74204341301e170d3036313131303030303030305a170d3331313131303030303030305a306c310b300906035504061302555331153013060355040a130c446967694365727420496e6331193017060355040b13107777772e64696769636572742e636f6d312b30290603550403132244696769436572742048696768204173737572616e636520455620526f6f7420434130820122300d06092a864886f70d01010105000382010f003082010a0282010100c6cce573e6fbd4bbe52d2d32a6dfe5813fc9cd2549b6712ac3d5943467a20a1cb05f69a640b1c4b7b28fd098a4a941593ad3dc94d63cdb7438a44acc4d2582f74aa5531238eef3496d71917e63b6aba65fc3a484f84f6251bef8c5ecdb3892e306e508910cc4284155fbcb5a89157e71e835bf4d72093dbe3a38505b77311b8db3c724459aa7ac6d00145a04b7ba13eb510a984141224e656187814150a6795c89de194a57d52ee65d1c532c7e98cd1a0616a46873d03404135ca171d35a7c55db5e64e13787305604e511b4298012f1793988a202117c2766b788b778f2ca0aa838ab0a64c2bf665d9584c1a1251e875d1a500b2012cc41bb6e0b5138b84bcb0203010001a3633061300e0603551d0f0101ff040403020186300f0603551d130101ff040530030101ff301d0603551d0e04160414b13ec36903f8bf4701d498261a0802ef63642bc3301f0603551d23041830168014b13ec36903f8bf4701d498261a0802ef63642bc3300d06092a864886f70d010105050003820101001c1a0697dcd79c9f3c886606085721db2147f82a67aabf183276401057c18af37ad911658e35fa9efc45b59ed94c314bb891e8432c8eb378cedbe3537971d6e5219401da55879a2464f68a66ccde9c37cda834b1699b23c89e78222b7043e35547316119ef58c5852f4e30f6a0311623c8e7e2651633cbbf1a1ba03df8ca5e8b318b6008892d0c065c52b7c4f90a98d1155f9f12be7c366338bd44a47fe4262b0ac497690de98ce2c01057b8c876129155f24869d8bc2a025b0f44d42031dbf4ba70265d90609ebc4b17092fb4cb1e4368c90727c1d25cf7ea21b968129c3c9cbf9efc805c9b63cdec47aa252767a037f300827d54d7a9f8e92e13a377e81f4a c800a97d7f.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 dbc692a428.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 0400000001000000100000000cd2f9e0da1773e9ed864da5e370e74e14000000010000001400000079b459e67bb6e5e40173800888c81a58f6e99b6e030000000100000014000000cabd2a79a1076a31f21d253635cb039d4329a5e80f00000001000000200000003f0411ede9c4477057d57e57883b1f205b20cdc0f3263129b1ee0269a2678f631900000001000000100000002fe1f70bb05d7c92335bc5e05b984da620000000010000006f0500003082056b30820353a0030201020211008210cfb0d240e3594463e0bb63828b00300d06092a864886f70d01010b0500304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f74205831301e170d3135303630343131303433385a170d3335303630343131303433385a304f310b300906035504061302555331293027060355040a1320496e7465726e65742053656375726974792052657365617263682047726f7570311530130603550403130c4953524720526f6f7420583130820222300d06092a864886f70d01010105000382020f003082020a0282020100ade82473f41437f39b9e2b57281c87bedcb7df38908c6e3ce657a078f775c2a2fef56a6ef6004f28dbde68866c4493b6b163fd14126bbf1fd2ea319b217ed1333cba48f5dd79dfb3b8ff12f1219a4bc18a8671694a66666c8f7e3c70bfad292206f3e4c0e680aee24b8fb7997e94039fd347977c99482353e838ae4f0a6f832ed149578c8074b6da2fd0388d7b0370211b75f2303cfa8faeddda63abeb164fc28e114b7ecf0be8ffb5772ef4b27b4ae04c12250c708d0329a0e15324ec13d9ee19bf10b34a8c3f89a36151deac870794f46371ec2ee26f5b9881e1895c34796c76ef3b906279e6dba49a2f26c5d010e10eded9108e16fbb7f7a8f7c7e50207988f360895e7e237960d36759efb0e72b11d9bbc03f94905d881dd05b42ad641e9ac0176950a0fd8dfd5bd121f352f28176cd298c1a80964776e4737baceac595e689d7f72d689c50641293e593edd26f524c911a75aa34c401f46a199b5a73a516e863b9e7d72a712057859ed3e5178150b038f8dd02f05b23e7b4a1c4b730512fcc6eae050137c439374b3ca74e78e1f0108d030d45b7136b407bac130305c48b7823b98a67d608aa2a32982ccbabd83041ba2830341a1d605f11bc2b6f0a87c863b46a8482a88dc769a76bf1f6aa53d198feb38f364dec82b0d0a28fff7dbe21542d422d0275de179fe18e77088ad4ee6d98b3ac6dd27516effbc64f533434f0203010001a3423040300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff301d0603551d0e0416041479b459e67bb6e5e40173800888c81a58f6e99b6e300d06092a864886f70d01010b05000382020100551f58a9bcb2a850d00cb1d81a6920272908ac61755c8a6ef882e5692fd5f6564bb9b8731059d321977ee74c71fbb2d260ad39a80bea17215685f1500e59ebcee059e9bac915ef869d8f8480f6e4e99190dc179b621b45f06695d27c6fc2ea3bef1fcfcbd6ae27f1a9b0c8aefd7d7e9afa2204ebffd97fea912b22b1170e8ff28a345b58d8fc01c954b9b826cc8a8833894c2d843c82dfee965705ba2cbbf7c4b7c74e3b82be31c822737392d1c280a43939103323824c3c9f86b255981dbe29868c229b9ee26b3b573a82704ddc09c789cb0a074d6ce85d8ec9efceabc7bbb52b4e45d64ad026cce572ca086aa595e315a1f7a4edc92c5fa5fbffac28022ebed77bbbe3717b9016d3075e46537c3707428cd3c4969cd599b52ae0951a8048ae4c3907cecc47a452952bbab8fbadd233537de51d4d6dd5a1b1c7426fe64027355ca328b7078de78d3390e7239ffb509c796c46d5b415b3966e7e9b0c963ab8522d3fd65be1fb08c284fe24a8a389daac6ae1182ab1a843615bd31fdc3b8d76f22de88d75df17336c3d53fb7bcb415fffdca2d06138e196b8ac5d8b37d775d533c09911ae9d41c1727584be0241425f67244894d19b27be073fb9b84f817451e17ab7ed9d23e2bee0d52804133c31039edd7a6c8fc60718c67fde478e3f289e0406cfa5543477bdec899be91743df5bdb5ffe8e1e57a2cd409d7e6222dade1827 dbc692a428.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1748 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2940 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 2804 skotes.exe 1548 powershell.exe 1744 DJj.exe 1744 DJj.exe 1744 DJj.exe 2120 3b490692a6.exe 1432 9c17f6af59.exe 2976 powershell.exe 1368 935dbc58b6.exe 1368 935dbc58b6.exe 1368 935dbc58b6.exe 912 chrome.exe 912 chrome.exe 1028 24c72886f3.exe 2520 6ec085ef1c.exe 2520 6ec085ef1c.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 2520 6ec085ef1c.exe 2520 6ec085ef1c.exe 1368 935dbc58b6.exe 1368 935dbc58b6.exe 3592 dbc692a428.exe 3592 dbc692a428.exe 3592 dbc692a428.exe 3592 dbc692a428.exe 3592 dbc692a428.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 3236 powershell.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 1368 935dbc58b6.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 4016 graph.exe 3648 13ba0b14b2.exe 4016 graph.exe 3648 13ba0b14b2.exe 3648 13ba0b14b2.exe 3648 13ba0b14b2.exe 3648 13ba0b14b2.exe 3648 13ba0b14b2.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe 3436 DJj.exe -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 1548 powershell.exe Token: SeDebugPrivilege 1744 DJj.exe Token: SeRestorePrivilege 832 7z.exe Token: 35 832 7z.exe Token: SeSecurityPrivilege 832 7z.exe Token: SeSecurityPrivilege 832 7z.exe Token: SeRestorePrivilege 2096 7z.exe Token: 35 2096 7z.exe Token: SeSecurityPrivilege 2096 7z.exe Token: SeSecurityPrivilege 2096 7z.exe Token: SeRestorePrivilege 2516 7z.exe Token: 35 2516 7z.exe Token: SeSecurityPrivilege 2516 7z.exe Token: SeSecurityPrivilege 2516 7z.exe Token: SeRestorePrivilege 2876 7z.exe Token: 35 2876 7z.exe Token: SeSecurityPrivilege 2876 7z.exe Token: SeSecurityPrivilege 2876 7z.exe Token: SeRestorePrivilege 1016 7z.exe Token: 35 1016 7z.exe Token: SeSecurityPrivilege 1016 7z.exe Token: SeSecurityPrivilege 1016 7z.exe Token: SeRestorePrivilege 2592 7z.exe Token: 35 2592 7z.exe Token: SeSecurityPrivilege 2592 7z.exe Token: SeSecurityPrivilege 2592 7z.exe Token: SeRestorePrivilege 1620 7z.exe Token: 35 1620 7z.exe Token: SeSecurityPrivilege 1620 7z.exe Token: SeSecurityPrivilege 1620 7z.exe Token: SeRestorePrivilege 2032 7z.exe Token: 35 2032 7z.exe Token: SeSecurityPrivilege 2032 7z.exe Token: SeSecurityPrivilege 2032 7z.exe Token: SeDebugPrivilege 2976 powershell.exe Token: SeDebugPrivilege 1600 taskkill.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeShutdownPrivilege 912 chrome.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 2328 taskkill.exe Token: SeDebugPrivilege 1128 taskkill.exe Token: SeDebugPrivilege 2580 taskkill.exe Token: SeDebugPrivilege 2596 firefox.exe Token: SeDebugPrivilege 2596 firefox.exe Token: SeDebugPrivilege 2520 6ec085ef1c.exe Token: SeDebugPrivilege 3236 powershell.exe Token: SeDebugPrivilege 3436 DJj.exe -
Suspicious use of FindShellTrayWindow 16 IoCs
pid Process 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 912 chrome.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 2596 firefox.exe 2596 firefox.exe 2596 firefox.exe 2596 firefox.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe -
Suspicious use of SendNotifyMessage 13 IoCs
pid Process 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 2596 firefox.exe 2596 firefox.exe 2596 firefox.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe 1028 24c72886f3.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1976 wrote to memory of 2804 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 31 PID 1976 wrote to memory of 2804 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 31 PID 1976 wrote to memory of 2804 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 31 PID 1976 wrote to memory of 2804 1976 3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe 31 PID 2804 wrote to memory of 2776 2804 skotes.exe 33 PID 2804 wrote to memory of 2776 2804 skotes.exe 33 PID 2804 wrote to memory of 2776 2804 skotes.exe 33 PID 2804 wrote to memory of 2776 2804 skotes.exe 33 PID 2776 wrote to memory of 1548 2776 I0XmI2t.exe 34 PID 2776 wrote to memory of 1548 2776 I0XmI2t.exe 34 PID 2776 wrote to memory of 1548 2776 I0XmI2t.exe 34 PID 2804 wrote to memory of 1264 2804 skotes.exe 36 PID 2804 wrote to memory of 1264 2804 skotes.exe 36 PID 2804 wrote to memory of 1264 2804 skotes.exe 36 PID 2804 wrote to memory of 1264 2804 skotes.exe 36 PID 1264 wrote to memory of 2028 1264 mdjw5me.exe 38 PID 1264 wrote to memory of 2028 1264 mdjw5me.exe 38 PID 1264 wrote to memory of 2028 1264 mdjw5me.exe 38 PID 1264 wrote to memory of 2028 1264 mdjw5me.exe 38 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 1264 wrote to memory of 2908 1264 mdjw5me.exe 39 PID 2776 wrote to memory of 1744 2776 I0XmI2t.exe 40 PID 2776 wrote to memory of 1744 2776 I0XmI2t.exe 40 PID 2776 wrote to memory of 1744 2776 I0XmI2t.exe 40 PID 2776 wrote to memory of 1744 2776 I0XmI2t.exe 40 PID 2804 wrote to memory of 532 2804 skotes.exe 42 PID 2804 wrote to memory of 532 2804 skotes.exe 42 PID 2804 wrote to memory of 532 2804 skotes.exe 42 PID 2804 wrote to memory of 532 2804 skotes.exe 42 PID 532 wrote to memory of 1944 532 client.exe 43 PID 532 wrote to memory of 1944 532 client.exe 43 PID 532 wrote to memory of 1944 532 client.exe 43 PID 2804 wrote to memory of 1940 2804 skotes.exe 44 PID 2804 wrote to memory of 1940 2804 skotes.exe 44 PID 2804 wrote to memory of 1940 2804 skotes.exe 44 PID 2804 wrote to memory of 1940 2804 skotes.exe 44 PID 1940 wrote to memory of 2932 1940 c800a97d7f.exe 46 PID 1940 wrote to memory of 2932 1940 c800a97d7f.exe 46 PID 1940 wrote to memory of 2932 1940 c800a97d7f.exe 46 PID 1940 wrote to memory of 2932 1940 c800a97d7f.exe 46 PID 1940 wrote to memory of 2972 1940 c800a97d7f.exe 47 PID 1940 wrote to memory of 2972 1940 c800a97d7f.exe 47 PID 1940 wrote to memory of 2972 1940 c800a97d7f.exe 47 PID 1940 wrote to memory of 2972 1940 c800a97d7f.exe 47 PID 1940 wrote to memory of 2976 1940 c800a97d7f.exe 48 PID 1940 wrote to memory of 2976 1940 c800a97d7f.exe 48 PID 1940 wrote to memory of 2976 1940 c800a97d7f.exe 48 PID 1940 wrote to memory of 2976 1940 c800a97d7f.exe 48 PID 1940 wrote to memory of 2184 1940 c800a97d7f.exe 49 PID 1940 wrote to memory of 2184 1940 c800a97d7f.exe 49 PID 1940 wrote to memory of 2184 1940 c800a97d7f.exe 49 PID 1940 wrote to memory of 2184 1940 c800a97d7f.exe 49 PID 1940 wrote to memory of 1548 1940 c800a97d7f.exe 50 PID 1940 wrote to memory of 1548 1940 c800a97d7f.exe 50 PID 1940 wrote to memory of 1548 1940 c800a97d7f.exe 50 PID 1940 wrote to memory of 1548 1940 c800a97d7f.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Views/modifies file attributes 1 TTPs 3 IoCs
pid Process 2928 attrib.exe 2076 attrib.exe 2620 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe"C:\Users\Admin\AppData\Local\Temp\3dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d_Sigmanly.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe"C:\Users\Admin\AppData\Local\Temp\1020826001\I0XmI2t.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXAB5AHYAawBhAGQAZQBrAGsAcwBiAHEARABSAE8ARwBRAEkARABXACcA4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1548
-
-
C:\Users\Admin\AppData\Roaming\yvkadekksbqDROGQIDW\DJj.exe"C:\Users\Admin\AppData\Roaming\yvkadekksbqDROGQIDW\DJj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1744
-
-
-
C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"4⤵
- Executes dropped EXE
PID:2028
-
-
C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"C:\Users\Admin\AppData\Local\Temp\1020934001\mdjw5me.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2908
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021127001\client.exe"C:\Users\Admin\AppData\Local\Temp\1021127001\client.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Users\Admin\AppData\Local\Temp\1021127001\client.exe"C:\Users\Admin\AppData\Local\Temp\1021127001\client.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"4⤵
- Executes dropped EXE
PID:2932
-
-
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"4⤵
- Executes dropped EXE
PID:2972
-
-
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"4⤵
- Executes dropped EXE
PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"4⤵
- Executes dropped EXE
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"4⤵
- Executes dropped EXE
PID:1548
-
-
C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"C:\Users\Admin\AppData\Local\Temp\1021160001\c800a97d7f.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:2776
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021161001\3b490692a6.exe"C:\Users\Admin\AppData\Local\Temp\1021161001\3b490692a6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\1021162001\bb3083d181.exe"C:\Users\Admin\AppData\Local\Temp\1021162001\bb3083d181.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"4⤵
- Loads dropped DLL
PID:2852 -
C:\Windows\system32\mode.commode 65,105⤵PID:2152
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p24291711423417250691697322505 -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:832
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_7.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_6.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_5.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_4.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2032
-
-
C:\Windows\system32\attrib.exeattrib +H "in.exe"5⤵
- Views/modifies file attributes
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\main\in.exe"in.exe"5⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\system32\attrib.exeattrib +H +S C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:2620
-
-
C:\Windows\system32\attrib.exeattrib +H C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe6⤵
- Views/modifies file attributes
PID:2076
-
-
C:\Windows\system32\schtasks.exeschtasks /f /CREATE /TN "Intel_PTT_EK_Recertification" /TR "C:\Users\Admin\AppData\Roaming\Intel_PTT_EK_Recertification.exe" /SC MINUTE6⤵
- Scheduled Task/Job: Scheduled Task
PID:2940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell ping 127.0.0.1; del in.exe6⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\system32\PING.EXE"C:\Windows\system32\PING.EXE" 127.0.0.17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1748
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021163001\9c17f6af59.exe"C:\Users\Admin\AppData\Local\Temp\1021163001\9c17f6af59.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\1021164001\935dbc58b6.exe"C:\Users\Admin\AppData\Local\Temp\1021164001\935dbc58b6.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1368 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:912 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef6b39758,0x7fef6b39768,0x7fef6b397785⤵PID:1612
-
-
C:\Windows\system32\ctfmon.exectfmon.exe5⤵PID:2140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1152 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:25⤵PID:2700
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1352 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:85⤵PID:2152
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1620 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:85⤵PID:1340
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2188 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2068
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2396 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2076
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --extension-process --display-capture-permissions-policy-allowed --remote-debugging-port=9229 --disable-databases --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --mojo-platform-channel-handle=2524 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:15⤵
- Uses browser remote debugging
PID:2776
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1472 --field-trial-handle=1228,i,14976646536790944195,305220514307384697,131072 /prefetch:25⤵PID:3060
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""4⤵
- Uses browser remote debugging
- Enumerates system info in registry
PID:3516 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef4949758,0x7fef4949768,0x7fef49497785⤵PID:3528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1368 -s 13964⤵
- Loads dropped DLL
- Program crash
PID:3540
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021165001\24c72886f3.exe"C:\Users\Admin\AppData\Local\Temp\1021165001\24c72886f3.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1028 -
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefox.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM chrome.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msedge.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM opera.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM brave.exe /T4⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking4⤵PID:864
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking5⤵
- Checks processor information in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2596 -
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.0.25472219\3979775" -parentBuildID 20221007134813 -prefsHandle 1208 -prefMapHandle 1200 -prefsLen 20847 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {961667e1-d123-4949-bd51-e320168f66a2} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1284 f8f4858 gpu6⤵PID:1300
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.1.1699455565\2122908749" -parentBuildID 20221007134813 -prefsHandle 1488 -prefMapHandle 1484 -prefsLen 21708 -prefMapSize 233444 -appDir "C:\Program Files\Mozilla Firefox\browser" - {61755f14-8723-4c85-864c-296588e3d6dc} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 1500 e71858 socket6⤵PID:2872
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.2.479897423\1269486037" -childID 1 -isForBrowser -prefsHandle 2096 -prefMapHandle 2092 -prefsLen 21746 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {86ce446a-3764-4280-a522-52cafb2db1d3} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2108 f860258 tab6⤵PID:2848
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.3.33226579\303125420" -childID 2 -isForBrowser -prefsHandle 2532 -prefMapHandle 600 -prefsLen 26216 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e292f0f-32f3-405b-9283-253dd30d43b3} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 2440 e63f58 tab6⤵PID:2888
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.4.428552634\1489412576" -childID 3 -isForBrowser -prefsHandle 3784 -prefMapHandle 3780 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {0e9fb7fe-354c-4bfe-b62f-fd935edaef65} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 3796 1f2b4b58 tab6⤵PID:1440
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.5.915484116\2133746560" -childID 4 -isForBrowser -prefsHandle 3908 -prefMapHandle 3912 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {7daddc7b-125a-48af-949d-aee170a68cc7} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 3896 20e3e258 tab6⤵PID:600
-
-
C:\Program Files\Mozilla Firefox\firefox.exe"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="2596.6.597428147\874527121" -childID 5 -isForBrowser -prefsHandle 4072 -prefMapHandle 4076 -prefsLen 26275 -prefMapSize 233444 -jsInitHandle 864 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -appDir "C:\Program Files\Mozilla Firefox\browser" - {acbfa855-e589-4509-aa61-a18dbec8d12b} 2596 "\\.\pipe\gecko-crash-server-pipe.2596" 4060 20e3fd58 tab6⤵PID:1636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021166001\6ec085ef1c.exe"C:\Users\Admin\AppData\Local\Temp\1021166001\6ec085ef1c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\1021167001\dbc692a428.exe"C:\Users\Admin\AppData\Local\Temp\1021167001\dbc692a428.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:3592 -
C:\Program Files\Windows Media Player\graph\graph.exe"C:\Program Files\Windows Media Player\graph\graph.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4016
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021168001\a363a99195.exe"C:\Users\Admin\AppData\Local\Temp\1021168001\a363a99195.exe"3⤵
- Executes dropped EXE
PID:3932 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -WindowStyle Hidden -EncodedCommand QQBkAGQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgACcAQwA6AFwAVQBzAGUAcgBzAFwAQQBkAG0AaQBuAFwAQQBwAHAARABhAHQAYQBcAFIAbwBhAG0AaQBuAGcAXABuADQAcABmAHQAbQA1ADUAaQB2AGMAVABJAFQASwBHAEEARwBYACcA4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3236
-
-
C:\Users\Admin\AppData\Roaming\n4pftm55ivcTITKGAGX\DJj.exe"C:\Users\Admin\AppData\Roaming\n4pftm55ivcTITKGAGX\DJj.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436
-
-
-
C:\Users\Admin\AppData\Local\Temp\1021169001\13ba0b14b2.exe"C:\Users\Admin\AppData\Local\Temp\1021169001\13ba0b14b2.exe"3⤵
- Enumerates VirtualBox registry keys
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\1021170001\5e71784db4.exe"C:\Users\Admin\AppData\Local\Temp\1021170001\5e71784db4.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\1021171001\f74a883743.exe"C:\Users\Admin\AppData\Local\Temp\1021171001\f74a883743.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2960
-
-
C:\Users\Admin\AppData\Local\Temp\1021172001\a34ea5c0f0.exe"C:\Users\Admin\AppData\Local\Temp\1021172001\a34ea5c0f0.exe"3⤵
- Executes dropped EXE
PID:3504
-
-
C:\Users\Admin\AppData\Local\Temp\1021173001\0b0abaf571.exe"C:\Users\Admin\AppData\Local\Temp\1021173001\0b0abaf571.exe"3⤵PID:3608
-
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1856
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Modify Authentication Process
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify Tools
2Modify Authentication Process
1Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
3Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
4Credentials In Files
4Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Guest Profile\Sync Data\LevelDB\CURRENT~RFf788343.TMP
Filesize16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\000002.dbtmp
Filesize16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\System Profile\Site Characteristics Database\MANIFEST-000001
Filesize41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\download[1].htm
Filesize1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\activity-stream.discovery_stream.json.tmp
Filesize23KB
MD59ddb2926779a7575b444369aaa62b802
SHA14287a5408a17e92237e274f8f3ebc51cb189821e
SHA256598d193e77be97d8785539e2d1d089019ad618342750fa90bf9bde5b97d3fcde
SHA512a22526f1f5f3fc71c7e010241e9ee2ef30a1a9bc15bd9164e17b7b66d6e8dbcb15d4a2748958f4be27afa8732b0e165b76fcd30d041dc77df83448d71b3c4cab
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\settings\main\ms-language-packs\browser\newtab\asrouter.ftl
Filesize15KB
MD596c542dec016d9ec1ecc4dddfcbaac66
SHA16199f7648bb744efa58acf7b96fee85d938389e4
SHA2567f32769d6bb4e875f58ceb9e2fbfdc9bd6b82397eca7a4c5230b0786e68f1798
SHA512cda2f159c3565bc636e0523c893b293109de2717142871b1ec78f335c12bad96fc3f62bcf56a1a88abdeed2ac3f3e5e9a008b45e24d713e13c23103acc15e658
-
Filesize
2.9MB
MD575ca34215f6e3916c51c0af34fc17284
SHA13726ba089194df9221b1eed520d62e452d74d509
SHA2564d2340448332a51ceafe2cb2562b2441590eff605b7fc0478001ad103f495955
SHA51251a8285cd0c989ca4a659fb84f401f81e92bcc9a2b03f3f55da565bc2a9b6fefb115ddb0009d675e265e391c65fb4defc6326037b70b03eb6ed1364f1d7dc679
-
Filesize
520KB
MD581b5e34627858d87520f219c18cc5c7f
SHA1f2a58e0cfd375756c799112180deb3770cc55cf8
SHA25600297db7c9f2087e3c55b655df030155eedadd141ec2d31e47ff53aa82c43cc7
SHA512ceb2bdf9a1396c637bf946592661e816446df56e1ba46275aef10b09e8db385c78f39825153c1b74b37bb7750ba5a7a5afc82bf25b1a19a322fd8eae010eec08
-
Filesize
562KB
MD563c8c11ca850435d9b5ec2ea41e50c22
SHA109a92f137462216a052f2a819ce110a0ac2f4022
SHA25689f58c08d1ccdc0aa645f11fb84de4c8a1ee328fd8a847aca63523291465a3a4
SHA512abdb139e86a3268c4d2bb5581c804219eeefc992e1dab87b3eb059db24015c849ce64d16ed0745df43dc8ac7ae49dcd5fd5660e65924752e669deafa6bbaa803
-
Filesize
1.8MB
MD515709eba2afaf7cc0a86ce0abf8e53f1
SHA1238ebf0d386ecf0e56d0ddb60faca0ea61939bb6
SHA25610bff40a9d960d0be3cc81b074a748764d7871208f324de26d365b1f8ea3935a
SHA51265edefa20f0bb35bee837951ccd427b94a18528c6e84de222b1aa0af380135491bb29a049009f77e66fcd2abe5376a831d98e39055e1042ccee889321b96e8e9
-
Filesize
4.2MB
MD53a425626cbd40345f5b8dddd6b2b9efa
SHA17b50e108e293e54c15dce816552356f424eea97a
SHA256ba9212d2d5cd6df5eb7933fb37c1b72a648974c1730bf5c32439987558f8e8b1
SHA512a7538c6b7e17c35f053721308b8d6dc53a90e79930ff4ed5cffecaa97f4d0fbc5f9e8b59f1383d8f0699c8d4f1331f226af71d40325022d10b885606a72fe668
-
Filesize
1.8MB
MD51cfe779f24a544b770758f1e307e809d
SHA1ab302bea886be93fb1b42801f201c8d67e2f918f
SHA2561d2f03ec5351c1b32768b3cefe0ac495932ce28ca198788fd1824107205a35b2
SHA5120b6c3bf184ccfe940313cb9108e7b290c13f9a51d8ee174b48d0f0f6c3e7ad31c2f6909527f715606609ff85e748ad3d587b5421d010e0e7ea18040cc2d8ed9a
-
Filesize
2.8MB
MD5834e87ae494bebb16ff86bf763972296
SHA1da8441ebbcaca5fb16ca3f71a94cd3ac51eca410
SHA256fb0dd216ccaaa736a0a0d0832ad9bdca0e095245c98bb18d08ebfaf12aa2f063
SHA512ee869a756bf004d3674047289dd2598d55f04d2ac49cb628e4884d6a5e1637cb05754bd7dd29fdc63bd27a6a7ee7f61afaf9e03a4a2972a0009713444b6e0dd7
-
Filesize
950KB
MD5477bc37feecb2135c4ef90b1e36bf747
SHA15ee94ad73a3558c36c56e99695c9bc54e583b7fb
SHA256a174d0b4d14f98dddc8e5e6321976a832e35bd1d3c76bb81d109bc81d41f2318
SHA512a48d868e8151a46b47de603b7cf88643048f217ff1744fc640e54a7b68b848365c902b990f158d2b5646b251bf8be613576113c60b526aaeebcad0b1ed35d8c2
-
Filesize
2.7MB
MD556a6662e98f0c5432bcff76901c93279
SHA1cb30fdbe915e04a7c03e8ac8a6d911fb2d2cf2f4
SHA2560471d5dbdef3bc9e54d78e506bc78b7fb3b4794d4b08e4643e82ccd25973837a
SHA512c1ef70dd4cce9de870996fd53353df1878f92f031826ccb318a44a888e5224a07696091c0cbccbe1a575a17e5d9cb7d8be78149db7b3cd0817501cead2221428
-
Filesize
591KB
MD53567cb15156760b2f111512ffdbc1451
SHA12fdb1f235fc5a9a32477dab4220ece5fda1539d4
SHA2560285d3a6c1ca2e3a993491c44e9cf2d33dbec0fb85fdbf48989a4e3b14b37630
SHA512e7a31b016417218387a4702e525d33dd4fe496557539b2ab173cec0cb92052c750cfc4b3e7f02f3c66ac23f19a0c8a4eb6c9d2b590a5e9faeb525e517bc877ba
-
Filesize
4.2MB
MD5ef6018bf916cec9358b260a243e92469
SHA19231767baa77dde01cd6ec06adf48904607d731d
SHA256963630b9846e75467f4275f9932259def3f690e0e0909d63d956bf472613f98e
SHA512954fe0660511decea1d765f26c953a58fdfbd9d99d6e9456862afdb527ac7cf777d4fe9c5379e718a349228d21031434b1289ee2e311e8330f26011cc16f1c14
-
Filesize
1.8MB
MD5aac802762fe06d57287070597c28e422
SHA1b874ad4d4adc75cc9587ec6b1ec58649bb06f4a1
SHA25664faeb8d1049377e83f18712f7cea3aa772dac6cadfa65eb352d14080ab33caa
SHA512f083b898cd4356ea839489eaf69ee891f242a5c1dabd84daf14c7dd9b658fd5e7418a2caa5f3216b885a2220659f435ceef87f4763acdcbc63786124fbeeb013
-
Filesize
4.3MB
MD5d8c306be8b162d1bac121505807854c2
SHA1e4a51b11e25647c593d20fa21b63d9a2ae9aa05a
SHA256e5326d1008ed401c53b3ad6629a7b7dbac5de87bec42a0120f58b82a9e4b9e86
SHA512ebf89f44519c838365a4b817faa5956b2ae150a0d552336d6259275f7996a944524ab48fd259868b6982ec1cbcc9de2de78040098ea373cb0b68013b0240fe55
-
Filesize
2.5MB
MD587330f1877c33a5a6203c49075223b16
SHA155b64ee8b2d1302581ab1978e9588191e4e62f81
SHA25698f2344ed45ff0464769e5b006bf0e831dc3834f0534a23339bb703e50db17e0
SHA5127c747d3edb04e4e71dce7efa33f5944a191896574fee5227316739a83d423936a523df12f925ee9b460cce23b49271f549c1ee5d77b50a7d7c6e3f31ba120c8f
-
Filesize
758KB
MD5afd936e441bf5cbdb858e96833cc6ed3
SHA13491edd8c7caf9ae169e21fb58bccd29d95aefef
SHA256c6491d7a6d70c7c51baca7436464667b4894e4989fa7c5e05068dde4699e1cbf
SHA512928c15a1eda602b2a66a53734f3f563ab9626882104e30ee2bf5106cfd6e08ec54f96e3063f1ab89bf13be2c8822a8419f5d8ee0a3583a4c479785226051a325
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
4.3MB
MD5c80b5cb43e5fe7948c3562c1fff1254e
SHA1f73cb1fb9445c96ecd56b984a1822e502e71ab9d
SHA256058925e4bbfcb460a3c00ec824b8390583baef0c780a7c7ff01d43d9eec45f20
SHA512faa97a9d5d2a0bf78123f19f8657c24921b907268938c26f79e1df6d667f7bee564259a3a11022e8629996406cda9fa00434bb2b1de3e10b9bddc59708dbad81
-
Filesize
3.1MB
MD5cf6393e173fb6315d0c681bc78eb3528
SHA126dc307ae4ea1866d40c9a34e38768733ec30b34
SHA2563dee7134cbeea75160519a338fc848a18af80c46ef475fcd3c69a463d449c35d
SHA51247e722c9f4736faf9612aff748cb4e1211e00ffe0fe56a65dc0dbec07f7b5e81908269d7c31066250866f3459727874d88c27fa88be08e540d0eb1e048ced61f
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
1.7MB
MD50dc4014facf82aa027904c1be1d403c1
SHA15e6d6c020bfc2e6f24f3d237946b0103fe9b1831
SHA256a29ddd29958c64e0af1a848409e97401307277bb6f11777b1cfb0404a6226de7
SHA512cbeead189918657cc81e844ed9673ee8f743aed29ad9948e90afdfbecacc9c764fbdbfb92e8c8ceb5ae47cee52e833e386a304db0572c7130d1a54fd9c2cc028
-
Filesize
3.3MB
MD5cea368fc334a9aec1ecff4b15612e5b0
SHA1493d23f72731bb570d904014ffdacbba2334ce26
SHA25607e38cad68b0cdbea62f55f9bc6ee80545c2e1a39983baa222e8af788f028541
SHA512bed35a1cc56f32e0109ea5a02578489682a990b5cefa58d7cf778815254af9849e731031e824adba07c86c8425df58a1967ac84ce004c62e316a2e51a75c8748
-
Filesize
3.3MB
MD5045b0a3d5be6f10ddf19ae6d92dfdd70
SHA10387715b6681d7097d372cd0005b664f76c933c7
SHA25694b392e94fa47d1b9b7ae6a29527727268cc2e3484e818c23608f8835bc1104d
SHA51258255a755531791b888ffd9b663cc678c63d5caa932260e9546b1b10a8d54208334725c14529116b067bcf5a5e02da85e015a3bed80092b7698a43dab0168c7b
-
Filesize
440B
MD53626532127e3066df98e34c3d56a1869
SHA15fa7102f02615afde4efd4ed091744e842c63f78
SHA2562a0e18ef585db0802269b8c1ddccb95ce4c0bac747e207ee6131dee989788bca
SHA512dcce66d6e24d5a4a352874144871cd73c327e04c1b50764399457d8d70a9515f5bc0a650232763bf34d4830bab70ee4539646e7625cfe5336a870e311043b2bd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XO72RID462XNF2T33POF.temp
Filesize7KB
MD580704f4d1ea1fe29f99bdc23765aa4bb
SHA1711d1179932842f815f163585a13176c83f49a49
SHA256e23ecde4bb1d4ac3d6ff7143d8cfde192703c576e175aeaaade35278be8bd1b6
SHA5126e83b0bc190ca3e58af202969d1a8cfac59d9bb9a70845ab9e67192d5ba94dea4cdea7f7dfe50297d8b49903e428b70f0fe7fd4d1a9857eea851357b6fb0e94a
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\db\data.safe.bin
Filesize2KB
MD55713b0fad92152b483c78cbcfde5cf7b
SHA1e706b83cd1613e2541e6f27a78512e0c2ab104a7
SHA25652f4c217f0b39a3e620be2adcbb686b08e5736579aabdaafe3935354f28900fa
SHA5120ddb4dc9795f9509b9b39c352301b5aa31d63b51a41a99225fb410e715a82efb87f50e631c8b27f2edd2cef8a6d94a5995fdeafa7d86049c63f457a5962fcc7d
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\4f46ec31-d153-43ab-af92-8c9dde4f0ec8
Filesize745B
MD5c91b598825a45e13d228af0095a85434
SHA152909e8dc8360cf68ced8e76efd26ff1666020c6
SHA2562d0ff0599b57c21c89eb9c6f16a2af40271c017ee39211d106ebc7f30ccf7d90
SHA51229f5a2f957cb64ab89327de3675a912288ecd5c11b79853937f6a3fbdbd20c755485754a89b8cbccf10b9470573509ba6ab3b2800dd5cf3e71aad6c9494d351f
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\datareporting\glean\pending_pings\96bf98a9-452e-453d-ba79-a06baf0ba531
Filesize11KB
MD562ece3dabbdb1509b4ef8e6b6b068fcb
SHA137e1dbad674a042d956d32757c46c26d90480d90
SHA256a2dab5966265c690ddb9bc19625b61710a92308b64229b76611e3a10ff641ee6
SHA5122d7f824b8ae6102de190d7394f1d1d4e892c8e6707153f1923e16c9687dfedb8acb50fb884a3a23cf7c5d21818472e1ea2a8d55ece5c6c9de65f718b3d422b09
-
Filesize
6KB
MD52c9f37fe2e75fe385972ee1e5c1fb883
SHA133c49e4a5726d3261cfa456038c1d0069b725fb5
SHA2569fb062831a75a2e30774ff64f40cfbced93b8bd8f604e25d8bdf9f27b8d67156
SHA512d8ab928402ad5472187e70bb39e48823e5adc45dd0cdbf5b746f74508a59409a03956468d2234323efd8e20aa45853eb86eaeef684a80914e78c0739b7f4d1ae
-
Filesize
6KB
MD5d27d46569266003e360f519efd9c89a9
SHA1a8701273e9257b6c3729ba8507fe46abb951a6ae
SHA256e067f94af2a2d2e9ebef6188352e143ca3be52006f6b3eb58313384d01f30e45
SHA5129a4b0ef77ff89577f4e5a448a8b3af7be6efa56d8a3b2b89d9eefb7057c40370b5648392bcc5c060ec4455f314ab4d6b45ba0d869dd59a4c0a6e72791382360c
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\sessionstore-backups\recovery.jsonlz4
Filesize4KB
MD5d4d10332ad2b9bf0ba18ba140484d805
SHA145e90b6c24e513797750a71443370f5380254284
SHA256a5c30e4a6e967cc00ad2a8510fb76e301066cf8ba36ae417a37069239a7b4d40
SHA5123c1c598ace18a10455c651fec0d0d4d02716a32f32c0fccef9c93cd0d053292e5d492c22618c4006658c911385d1d4c6c650f4ca545e80a66612465b411feae8
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bz1ih2a5.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqlite
Filesize184KB
MD53dc733f51b6c47c0e57ae7035b9abacf
SHA1d4c28a6f9d4bae9e297440a46726a2cb3e2504ba
SHA256aafa700fb884f14becaf86a0eb9df79dfa15885b2ebe11cabe5f48a3a5d9e0e1
SHA512e02670f6fa626a21ad150e0e0e589ba9f1f7a1fb921dc28f4117dc0a30a337b9c9b165dd0a30da864fe4dbdf130372e846648792a0bcf5aad4e8d28118101067
-
Filesize
300KB
MD595b7a7cbc0aff0215004c5a56ea5952c
SHA1a1fb08b02975ec4869bcaf387d09d0abcced27e9
SHA256e9aa0b4540115b3dcec3af70b6de27e54e4a0fa96d1d3cb33bac121d804c1d61
SHA51297ac66de88cac709e37d59c8a388c18d69aa3422d275be3e28b92e87167bcd87a310125e7dca593fe1b66d2f826cb2e22b64d51eac07dc94981dcd123e906961