Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
10-02-2025 00:31
Static task
static1
Behavioral task
behavioral1
Sample
V2D0I_random.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
V2D0I_random.exe
Resource
win10v2004-20250129-en
General
-
Target
V2D0I_random.exe
-
Size
2.1MB
-
MD5
6236a0f253b635db9dc436bcdf8760f1
-
SHA1
ed4fd3548ba42beca7fbc73538b2097c7677d10b
-
SHA256
f758d7e254cb8fcd0f8fcbeea716ccee5305acc4279c94d367c71d75fcea3b42
-
SHA512
b6daded3fa328d6f1b49f902936be02e69cc685598a6b9fb5b43277330407e0df688048fe9d07a0cb742efeae6e2f867000c8a7274b906223b7b65db14c7d15a
-
SSDEEP
49152:RPVvoutG0l35Q/wcohXw5GTkQlf02ZDk7vsLipRw:R9vokGupIwZmWMyYo2Q
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Detect Vidar Stealer 12 IoCs
resource yara_rule behavioral2/memory/992-57-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-92-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-109-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-115-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-117-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-119-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-121-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-148-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-160-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-164-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-166-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 behavioral2/memory/992-182-0x0000000000400000-0x000000000085E000-memory.dmp family_vidar_v7 -
Vidar family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ V2D0I_random.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Bjkm5hE.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 2 IoCs
flow pid Process 23 744 skotes.exe 139 744 skotes.exe -
Uses browser remote debugging 2 TTPs 9 IoCs
Can be used control the browser and steal sensitive information such as credentials and session cookies.
pid Process 2356 chrome.exe 2500 msedge.exe 3748 msedge.exe 2968 msedge.exe 1624 msedge.exe 4380 chrome.exe 1876 chrome.exe 3780 chrome.exe 4648 msedge.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion V2D0I_random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion V2D0I_random.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Bjkm5hE.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation V2D0I_random.exe Key value queried \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 5 IoCs
pid Process 744 skotes.exe 1224 skotes.exe 992 Bjkm5hE.exe 2116 skotes.exe 3312 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Wine V2D0I_random.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3625106387-4207083342-115176794-1000\Software\Wine Bjkm5hE.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 3960 V2D0I_random.exe 744 skotes.exe 1224 skotes.exe 992 Bjkm5hE.exe 2116 skotes.exe 3312 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job V2D0I_random.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language V2D0I_random.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bjkm5hE.exe -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Bjkm5hE.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Bjkm5hE.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 msedge.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Cryptography\TPM\Telemetry chrome.exe Set value (int) \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Cryptography\TPM\Telemetry\TraceTimeLast = "133836211636550981" chrome.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
pid Process 3960 V2D0I_random.exe 3960 V2D0I_random.exe 744 skotes.exe 744 skotes.exe 1224 skotes.exe 1224 skotes.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 2116 skotes.exe 2116 skotes.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 1876 msedge.exe 808 msedge.exe 808 msedge.exe 2500 msedge.exe 2500 msedge.exe 992 Bjkm5hE.exe 992 Bjkm5hE.exe 3312 skotes.exe 3312 skotes.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe Token: SeShutdownPrivilege 4380 chrome.exe Token: SeCreatePagefilePrivilege 4380 chrome.exe -
Suspicious use of FindShellTrayWindow 52 IoCs
pid Process 3960 V2D0I_random.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 4380 chrome.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe 2500 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3960 wrote to memory of 744 3960 V2D0I_random.exe 87 PID 3960 wrote to memory of 744 3960 V2D0I_random.exe 87 PID 3960 wrote to memory of 744 3960 V2D0I_random.exe 87 PID 744 wrote to memory of 992 744 skotes.exe 96 PID 744 wrote to memory of 992 744 skotes.exe 96 PID 744 wrote to memory of 992 744 skotes.exe 96 PID 992 wrote to memory of 4380 992 Bjkm5hE.exe 98 PID 992 wrote to memory of 4380 992 Bjkm5hE.exe 98 PID 4380 wrote to memory of 3596 4380 chrome.exe 99 PID 4380 wrote to memory of 3596 4380 chrome.exe 99 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1480 4380 chrome.exe 100 PID 4380 wrote to memory of 1792 4380 chrome.exe 101 PID 4380 wrote to memory of 1792 4380 chrome.exe 101 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102 PID 4380 wrote to memory of 3004 4380 chrome.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\V2D0I_random.exe"C:\Users\Admin\AppData\Local\Temp\V2D0I_random.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"C:\Users\Admin\AppData\Local\Temp\1071208001\Bjkm5hE.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb91d7cc40,0x7ffb91d7cc4c,0x7ffb91d7cc585⤵PID:3596
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=2052,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=1704 /prefetch:25⤵PID:1480
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1864,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2132 /prefetch:35⤵PID:1792
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2236,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=2260 /prefetch:85⤵PID:3004
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3164,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3176 /prefetch:15⤵
- Uses browser remote debugging
PID:1876
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3184,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=3340 /prefetch:15⤵
- Uses browser remote debugging
PID:2356
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9223 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4464,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4272 /prefetch:15⤵
- Uses browser remote debugging
PID:3780
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4596,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4588 /prefetch:85⤵PID:3140
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4488,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4536 /prefetch:85⤵PID:5104
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4792,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4804 /prefetch:85⤵PID:4136
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=5008,i,11032030274862464648,9197964526962274324,262144 --variations-seed-version=20250128-180236.310000 --mojo-platform-channel-handle=4840 /prefetch:85⤵PID:3920
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9223 --profile-directory="Default"4⤵
- Uses browser remote debugging
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
PID:2500 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0x7c,0x108,0x7ffb91af46f8,0x7ffb91af4708,0x7ffb91af47185⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2076 /prefetch:25⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2232 /prefetch:35⤵
- Suspicious behavior: EnumeratesProcesses
PID:808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2936 /prefetch:85⤵PID:3428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3396 /prefetch:15⤵
- Uses browser remote debugging
PID:2968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3412 /prefetch:15⤵
- Uses browser remote debugging
PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4356 /prefetch:15⤵
- Uses browser remote debugging
PID:4648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9223 --field-trial-handle=2044,227075617923250093,4831815826955638918,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3812 /prefetch:15⤵
- Uses browser remote debugging
PID:1624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1224
-
C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"1⤵PID:4824
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc1⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3312
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Modify Authentication Process
1Steal Web Session Cookie
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649B
MD5f701d75d3a49fa310787009aac064fc7
SHA1474a1922d6b6869a4e534161e63a2d57be7dda10
SHA256fc5267a968d04902529b481648afb917bca67310d2013cb01d77af539b865fb7
SHA5124a5ac5830b32257234ad9c3b98acfed9f074fb57e0b10d1931e67d003972c894c8410a61df276982236d3e14ce2580799df949564d0f2e212fb68dc5984f8c5e
-
Filesize
2B
MD5d751713988987e9331980363e24189ce
SHA197d170e1550eee4afc0af065b78cda302a97674c
SHA2564f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945
SHA512b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af
-
Filesize
152B
MD5709e5bc1c62a5aa20abcf92d1a3ae51c
SHA171c8b6688cd83f8ba088d3d44d851c19ee9ccff6
SHA256aa718e97104d2a4c68a9dad4aae806a22060702177f836403094f7ca7f0f8d4e
SHA512b9fc809fbb95b29336e5102382295d71235b0e3a54828b40380958a7feaf27c6407461765680e1f61d88e2692e912f8ec677a66ff965854bea6afae69d99cf24
-
Filesize
152B
MD5bc29044ff79dd25458f32c381dc676af
SHA1f4657c0bee9b865607ec3686b8d4f5d4c2c61cd7
SHA256efe711204437661603d6e59765aba1654678f2093075c1eb2340dc5e80a1140f
SHA5123d484f755d88c0485195b247230edb79c07cc0941dedbf2f34738ae4f80ba90595f5094c449b213c0c871ade6aff0a14d4acfe843186e2421ccbad221d34bf54
-
Filesize
5KB
MD5a668b04d6b5a2953815a3f326f943247
SHA1d93d83aa000781dc4e10bda12884c1759d5f65e2
SHA2561ad7d230f561f7aa86cf62c3e596faeed3c0ac59bb4f829761cccf741344b424
SHA5125632c0877132ac0f45adccefdca49f22fac483d449a765fae503d5cfbe589d47e8fdbdb9cbb86efff1a7745f473194664021c76884a166b9db4a3a9d1ee3d038
-
Filesize
1.7MB
MD50f2e0a4daa819b94536f513d8bb3bfe2
SHA14f73cec6761d425000a5586a7325378148d67861
SHA2568afc16be658f69754cc0654864ffed46c97a7558db0c39e0f2d5b870c1ff6e39
SHA51280a35414c2be58deec0f3382a8e949a979f67d4f02c2700cf0da4b857cdcc8daa6b00ce2bcc3864edb87446086fe3f547a60580449935dbad5fb5f08dda69f1b
-
Filesize
880KB
MD5589765624438c4ee740ca95400050667
SHA1a2f361ff3093d7ed4c9528ea9c7875cf1e067797
SHA256c33b5babff7534678ba2599d53b15ca532d2ee5d8b9f69a3454e13229112ebe2
SHA5121c77990790a875559b50966b16d1bb49fdfa8cdd8db67c6bb252dd0a391d7ad077bc03c6e4015a32afa70a728b9d3770d361b97e7287e5cd407218488b4ccdc3
-
Filesize
2.1MB
MD56236a0f253b635db9dc436bcdf8760f1
SHA1ed4fd3548ba42beca7fbc73538b2097c7677d10b
SHA256f758d7e254cb8fcd0f8fcbeea716ccee5305acc4279c94d367c71d75fcea3b42
SHA512b6daded3fa328d6f1b49f902936be02e69cc685598a6b9fb5b43277330407e0df688048fe9d07a0cb742efeae6e2f867000c8a7274b906223b7b65db14c7d15a