Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 12:36
Static task
static1
Behavioral task
behavioral1
Sample
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe
Resource
win7-20240903-en
General
-
Target
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe
-
Size
2.0MB
-
MD5
354e5ac5449695bd3e8520e47ba4815e
-
SHA1
a023339baaea904f78d73c5b440ffa764aa9b6a2
-
SHA256
54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a
-
SHA512
ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e
-
SSDEEP
49152:PyurhZIw1XiVWyvHdT8rXVZJDBw+fsPtoajy/v/FGiLi/0/dN:n0swdTiXBBRsPCRpLiE
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
amadey
5.21
a4d2cd
http://cobolrationumelawrtewarms.com
http://�������� jlgenfekjlfnvtgpegkwr.xyz
-
install_dir
a58456755d
-
install_file
Gxtuum.exe
-
strings_key
00fadbeacf092dfd58b48ef4ac68f826
-
url_paths
/3ofn3jf3e2ljk/index.php
Extracted
xworm
5.0
185.163.204.65:7000
SWaSxcOz2FkLWFU7
-
install_file
USB.exe
-
telegram
https://api.telegram.org/bot7801507553:AAER1leGn_BtfmbwwWVlXFOz-GpclQKTfe0/sendMessage?chat_id=6012304042
Signatures
-
Amadey family
-
Detect Poverty Stealer Payload 1 IoCs
resource yara_rule behavioral2/memory/1968-88-0x00000000009C0000-0x0000000000E04000-memory.dmp family_povertystealer -
Detect Xworm Payload 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023d5c-231.dat family_xworm behavioral2/memory/1048-245-0x00000000004B0000-0x00000000004E0000-memory.dmp family_xworm -
Poverty Stealer
Poverty Stealer is a crypto and infostealer written in C++.
-
Povertystealer family
-
Xworm family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 8QQOJj9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ uXivbut.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ sha256.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ftS1RPn.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Gxtuum.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 10 IoCs
flow pid Process 17 4224 skotes.exe 17 4224 skotes.exe 17 4224 skotes.exe 17 4224 skotes.exe 17 4224 skotes.exe 17 4224 skotes.exe 17 4224 skotes.exe 17 4224 skotes.exe 64 4224 skotes.exe 86 2732 futors.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion sha256.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ftS1RPn.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8QQOJj9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion uXivbut.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Gxtuum.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation uXivbut.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation Gxtuum.exe Key value queried \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Control Panel\International\Geo\Nation amnew.exe -
Executes dropped EXE 19 IoCs
pid Process 4224 skotes.exe 2864 skotes.exe 3324 lwtLxxH.exe 1208 7nSTXG6.exe 1968 ftS1RPn.exe 1264 8QQOJj9.exe 5048 uXivbut.exe 4352 Gxtuum.exe 1260 skotes.exe 3124 sha256.exe 3344 Gxtuum.exe 1696 83823fe455.exe 3484 DF9PCFR.exe 1048 7tzlyz8.exe 1052 amnew.exe 2732 futors.exe 872 skotes.exe 3036 Gxtuum.exe 4416 futors.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine uXivbut.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine sha256.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine ftS1RPn.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine Gxtuum.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1161330783-2912525651-1278508834-1000\Software\Wine 8QQOJj9.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 32 ipinfo.io -
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 4224 skotes.exe 2864 skotes.exe 1968 ftS1RPn.exe 1264 8QQOJj9.exe 5048 uXivbut.exe 4352 Gxtuum.exe 1260 skotes.exe 3124 sha256.exe 3344 Gxtuum.exe 872 skotes.exe 3036 Gxtuum.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3484 set thread context of 4168 3484 DF9PCFR.exe 109 PID 1696 set thread context of 2492 1696 83823fe455.exe 105 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe File created C:\Windows\Tasks\Gxtuum.job uXivbut.exe File created C:\Windows\Tasks\futors.job amnew.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3380 1208 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ftS1RPn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8QQOJj9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language uXivbut.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sha256.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DF9PCFR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AddInProcess32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7nSTXG6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Gxtuum.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 83823fe455.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language amnew.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language futors.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1048 7tzlyz8.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 4224 skotes.exe 4224 skotes.exe 2864 skotes.exe 2864 skotes.exe 3324 lwtLxxH.exe 3324 lwtLxxH.exe 1968 ftS1RPn.exe 1968 ftS1RPn.exe 3324 lwtLxxH.exe 3324 lwtLxxH.exe 1264 8QQOJj9.exe 1264 8QQOJj9.exe 1264 8QQOJj9.exe 1264 8QQOJj9.exe 1264 8QQOJj9.exe 1264 8QQOJj9.exe 5048 uXivbut.exe 5048 uXivbut.exe 4352 Gxtuum.exe 4352 Gxtuum.exe 1260 skotes.exe 1260 skotes.exe 3124 sha256.exe 3124 sha256.exe 3344 Gxtuum.exe 3344 Gxtuum.exe 1696 83823fe455.exe 1696 83823fe455.exe 1696 83823fe455.exe 1048 7tzlyz8.exe 2492 AddInProcess32.exe 2492 AddInProcess32.exe 2492 AddInProcess32.exe 2492 AddInProcess32.exe 872 skotes.exe 872 skotes.exe 3036 Gxtuum.exe 3036 Gxtuum.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3324 lwtLxxH.exe Token: SeDebugPrivilege 1696 83823fe455.exe Token: SeDebugPrivilege 1048 7tzlyz8.exe Token: SeDebugPrivilege 1048 7tzlyz8.exe Token: SeDebugPrivilege 2492 AddInProcess32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1048 7tzlyz8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1340 wrote to memory of 4224 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 87 PID 1340 wrote to memory of 4224 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 87 PID 1340 wrote to memory of 4224 1340 54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe 87 PID 4224 wrote to memory of 3324 4224 skotes.exe 89 PID 4224 wrote to memory of 3324 4224 skotes.exe 89 PID 4224 wrote to memory of 1208 4224 skotes.exe 90 PID 4224 wrote to memory of 1208 4224 skotes.exe 90 PID 4224 wrote to memory of 1208 4224 skotes.exe 90 PID 4224 wrote to memory of 1968 4224 skotes.exe 97 PID 4224 wrote to memory of 1968 4224 skotes.exe 97 PID 4224 wrote to memory of 1968 4224 skotes.exe 97 PID 4224 wrote to memory of 1264 4224 skotes.exe 98 PID 4224 wrote to memory of 1264 4224 skotes.exe 98 PID 4224 wrote to memory of 1264 4224 skotes.exe 98 PID 4224 wrote to memory of 5048 4224 skotes.exe 99 PID 4224 wrote to memory of 5048 4224 skotes.exe 99 PID 4224 wrote to memory of 5048 4224 skotes.exe 99 PID 5048 wrote to memory of 4352 5048 uXivbut.exe 100 PID 5048 wrote to memory of 4352 5048 uXivbut.exe 100 PID 5048 wrote to memory of 4352 5048 uXivbut.exe 100 PID 4352 wrote to memory of 3124 4352 Gxtuum.exe 102 PID 4352 wrote to memory of 3124 4352 Gxtuum.exe 102 PID 4352 wrote to memory of 3124 4352 Gxtuum.exe 102 PID 4224 wrote to memory of 1696 4224 skotes.exe 104 PID 4224 wrote to memory of 1696 4224 skotes.exe 104 PID 4224 wrote to memory of 1696 4224 skotes.exe 104 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 1696 wrote to memory of 2492 1696 83823fe455.exe 105 PID 4224 wrote to memory of 3484 4224 skotes.exe 106 PID 4224 wrote to memory of 3484 4224 skotes.exe 106 PID 4224 wrote to memory of 3484 4224 skotes.exe 106 PID 4224 wrote to memory of 1048 4224 skotes.exe 107 PID 4224 wrote to memory of 1048 4224 skotes.exe 107 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 4224 wrote to memory of 1052 4224 skotes.exe 110 PID 4224 wrote to memory of 1052 4224 skotes.exe 110 PID 4224 wrote to memory of 1052 4224 skotes.exe 110 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 1052 wrote to memory of 2732 1052 amnew.exe 111 PID 1052 wrote to memory of 2732 1052 amnew.exe 111 PID 1052 wrote to memory of 2732 1052 amnew.exe 111 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 1696 wrote to memory of 1644 1696 83823fe455.exe 112 PID 3484 wrote to memory of 4168 3484 DF9PCFR.exe 109 PID 2492 wrote to memory of 4652 2492 AddInProcess32.exe 113 PID 2492 wrote to memory of 4652 2492 AddInProcess32.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe"C:\Users\Admin\AppData\Local\Temp\54c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"C:\Users\Admin\AppData\Local\Temp\1089465001\lwtLxxH.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3324
-
-
C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"C:\Users\Admin\AppData\Local\Temp\1090306001\7nSTXG6.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 8564⤵
- Program crash
PID:3380
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"C:\Users\Admin\AppData\Local\Temp\1090507001\ftS1RPn.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"C:\Users\Admin\AppData\Local\Temp\1090525001\8QQOJj9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"C:\Users\Admin\AppData\Local\Temp\1090607001\uXivbut.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe"4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"C:\Users\Admin\AppData\Roaming\10000180100\sha256.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090673001\83823fe455.exe"C:\Users\Admin\AppData\Local\Temp\1090673001\83823fe455.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:4652
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵PID:3976
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"4⤵PID:1644
-
-
-
C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"C:\Users\Admin\AppData\Local\Temp\1090769001\DF9PCFR.exe"4⤵PID:4168
-
-
-
C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"C:\Users\Admin\AppData\Local\Temp\1091048001\7tzlyz8.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe"C:\Users\Admin\AppData\Local\Temp\1091498001\amnew.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe"4⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2864
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1208 -ip 12081⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1260
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3344
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:872
-
C:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exeC:\Users\Admin\AppData\Local\Temp\a58456755d\Gxtuum.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3036
-
C:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exeC:\Users\Admin\AppData\Local\Temp\97419fb2c0\futors.exe1⤵
- Executes dropped EXE
PID:4416
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5515748a93ce7beb3f4416ec66ba8488e
SHA13ba2f1a56dcc91967361622c56b1ba545cda4325
SHA256a09d49280077ed84d72c5b39977a67155f7bf1bc12615fecb6ec81a0aa2f92a6
SHA5123ce752a103a11b4ef84e6531f4feebcd70f5dfde979e3952709a686fb03e67741d894037406fc23fc5ea3b506d650653a01f3ef48fd7b5a44f79e45c8eb96ffb
-
Filesize
136KB
MD576a1de8dc8bff924e884ade0a7ac4967
SHA1f9b2ac72407ffdbc2699f3a3292f22a391d5254f
SHA2568c3af9b8fdd734699dd7bd451f0efd5e10da99aadd37ef20b9d98a79ad53c552
SHA512461b29e801ed1980ad8cb07dcf96a652351317592281907d0b773b3bf378df28d1ea3de7bdfc459662c176369b48abcdbac0ef481c389525b00aa91de0f258d8
-
Filesize
1.7MB
MD5356ccfc1d038c4bf5aa960b6d18bc9c5
SHA13507e3c30b44a318d15b30650744faa1c6c1169b
SHA256bb745707746aa0b3053489a691ef41fa34f4d70364e9f06d53ee052bfcb24a7f
SHA512dcf9897335f2992057e1a5ea571a2a98591caf79804a6275aa8bb4f1e9aa934aa2aa89424c5812722436d88bf70c7aea1d8a7843e9ba93d1ca41061253689ebd
-
Filesize
2.8MB
MD50658a83d9b5dbbc9dd5bf50c1efbbf1a
SHA16ef596985aa7da0170706e9a0a71a9189534f66c
SHA256567ed55e81371392654e71e8769ff899ef92b1c28d1deb4bbde3219a8872ec00
SHA5122751bde5b88526f5caddabdbb5ce7214480e1d552b0aeae5888db02d8818a8c2bf71d5e6927cc22097ca62f206b98c6540a019bdb5ca2aa1fcc13260e3546a3c
-
Filesize
2.1MB
MD5ebc28b4636ffb2ccd31c069fe4e3153e
SHA11123d1a5af8b311e66164a4eb9a4a5abf671f47a
SHA2564fca516e363db4103349dbc6807f522060c0d3d9adf1eb9e4459c783b81059d1
SHA512f3d714acb0462b6bc3736fb5349bfab0b76fec39da7934cc79ac8decc8a7fb464afb9e1ac915f96595537ef5e3c803b4a0a31d6a904d0b7233ff160226960e0f
-
Filesize
6.6MB
MD56ea2a7f9508369885220226be0fd705d
SHA1030757e8417498cf85867fe46f59ca6b6cf1498f
SHA2566f024c0d869fe42a3da00c477b0234fb97dc6d4d576c4e897ddfc062add40478
SHA5127d1bfeb83555004c930f2680482ab5fc6dde6e37ab067d0303a19b6bb9d2b4d59cc219e6bb4533f424dd5fcedbeff9930698049153b866a7434a0bd08500df3e
-
Filesize
2.1MB
MD5d59903af15c5257c5e274b297bec5e6d
SHA11d84da470c7821a2dbcc9a788e720a4bce32c8c4
SHA256879785b2c857249d89f97b79ccb4ce25bbb8d1c60f4d003a23fdf1913f40fa2d
SHA5122ab588a14cd70fa5684d1c82d13ddf48037499b7742fe7af5408044b0776ca4610a9f3780ad2fc302a03d7ce90932219b619fa117e33bfc5f0e860c2663dd42c
-
Filesize
173KB
MD5a43d79a6456eefe4bc9fee38bfe7b8f7
SHA18f8d0183e4ed13ed8ba02e647705b0782ca65061
SHA25694c256f4b3313e68f351ceabccc2dcdf81583f118d0e8ccbac74e8165bbf3047
SHA5127cdb870740e1f7d5aa1103d060eb31336c6634f13b02cc17dced0b462f5a7088934cdd327e86e8e2b9bb01fc300787cb16c5f353cf70afd237c1a9d53bf6f093
-
Filesize
429KB
MD522892b8303fa56f4b584a04c09d508d8
SHA1e1d65daaf338663006014f7d86eea5aebf142134
SHA25687618787e1032bbf6a6ca8b3388ea3803be20a49e4afaba1df38a6116085062f
SHA512852dcc1470f33bc601a814f61a37c1f5a10071ff3354f101be0ef9aa5ac62b4433a732d02acd4247c2a1819fef9adef7dd6722ee8eb9e8501bac033eb877c744
-
Filesize
2.0MB
MD5354e5ac5449695bd3e8520e47ba4815e
SHA1a023339baaea904f78d73c5b440ffa764aa9b6a2
SHA25654c7d653f14ae0faf17375353ec587dadddf77c3d07161c9bfa35485cba3351a
SHA512ab31ab9d52efb5955003f62ec7d87dd706daf322d154a03bbe3533c385f9802777b1e939b9cfdbe9acd4431e7855907ae0d3c88a89ced8b20fb30a008550d42e
-
Filesize
4.1MB
MD5f1abe4f549ebdf621c51ee73a35d548a
SHA12e98814bf5f0b37380a210278b12b24bb262433f
SHA2562d10c308f8eb83b56d8491f593dcf492e6a57ddfc66ee285212cfa70482563bd
SHA512da6460bbad6e52f1b81f344397a964512a576d08d7623c1476ec3b7e749a4446117f86c7918bcf45ae42107717aac6a697cb0709da8bee53a7b35abb7d26411b
-
Filesize
2.1MB
MD5817caec31605801a67c847f63ce7bb20
SHA1f023444245b780be58b0c6672a56a7deb8597424
SHA256162d2eec1e9bbec8f7e160053cf1ea77f080c24df69ac427f474e468f955d1b6
SHA512ca8abae689f303dab56eeaa8b29b89498c193693563c6fcd2419faf514062865c64b3e9894ec19e923051d458736f1b5efa28234e21ea7acc2ada881aa2fa936