Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 00:21
Static task
static1
Behavioral task
behavioral1
Sample
4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe
Resource
win10v2004-20250314-en
General
-
Target
4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe
-
Size
7.0MB
-
MD5
e0ded4a87612d3928cffc18b0b6c9254
-
SHA1
ad6271623f189d0a9296812051249f2fa75c3010
-
SHA256
4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9
-
SHA512
5d2c85d9757269d8a9a3f5def8448dc695457340e825d8c61c128c5a8df1f171df46e7c03e31db8ce77a07c2941b7ecf0ebdfa9e72d98929056f1d85952279d5
-
SSDEEP
196608:MPhdHGx5o+SveoEFNLnxoJqOCXhVXFj1yZRoOQ/oV:MPhdmXofYNrWJqOCx9d1SoO4oV
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://powerful-avoids.sbs/api
https://motion-treesz.sbs/api
https://disobey-curly.sbs/api
https://leg-sate-boat.sbs/api
https://story-tense-faz.sbs/api
https://blade-govern.sbs/api
https://occupy-blushi.sbs/api
https://frogs-severz.sbs/api
https://property-imper.sbs/api
Extracted
stealc
mars
http://185.215.113.206
-
url_path
/c4becf79229cb002.php
Extracted
amadey
5.21
092155
http://176.113.115.6
-
install_dir
bb556cff4a
-
install_file
rapes.exe
-
strings_key
a131b127e996a898cd19ffb2d92e481b
-
url_paths
/Ni9kiput/index.php
Extracted
stealc
trump
http://45.93.20.28
-
url_path
/85a1cacf11314eb8.php
Signatures
-
Amadey family
-
Detects Healer an antivirus disabler dropper 3 IoCs
resource yara_rule behavioral1/memory/4320-50-0x0000000000B20000-0x0000000000DE6000-memory.dmp healer behavioral1/memory/4320-51-0x0000000000B20000-0x0000000000DE6000-memory.dmp healer behavioral1/memory/4320-110-0x0000000000B20000-0x0000000000DE6000-memory.dmp healer -
Gcleaner family
-
Healer family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\DisableAntiSpyware = "1" 4B471I.exe -
Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 4B471I.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 4B471I.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4B471I.exe -
Modifies Windows Defender notification settings 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender Security Center\Notifications\DisableNotifications = "1" 4B471I.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 12 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2Z8801.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3t97u.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4B471I.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 5d8e367a3e.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ c30b330d66.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 1N24W4.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ed90cfbb12.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 128c38ec1c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 237d8220b9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file 5 IoCs
flow pid Process 43 1540 skotes.exe 43 1540 skotes.exe 43 1540 skotes.exe 83 2512 svchost015.exe 84 2036 svchost015.exe -
Checks BIOS information in registry 2 TTPs 24 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 5d8e367a3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion c30b330d66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 237d8220b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 1N24W4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion c30b330d66.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 128c38ec1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2Z8801.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2Z8801.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4B471I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4B471I.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 5d8e367a3e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3t97u.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ed90cfbb12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ed90cfbb12.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 128c38ec1c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 237d8220b9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 1N24W4.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3t97u.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation 1N24W4.exe -
Executes dropped EXE 16 IoCs
pid Process 1424 Z8l79.exe 3716 y0m71.exe 5108 1N24W4.exe 1540 skotes.exe 5892 2Z8801.exe 4612 3t97u.exe 4320 4B471I.exe 3152 5d8e367a3e.exe 6032 ed90cfbb12.exe 2392 c30b330d66.exe 824 128c38ec1c.exe 1536 237d8220b9.exe 2512 svchost015.exe 2036 svchost015.exe 1084 skotes.exe 2032 skotes.exe -
Identifies Wine through registry keys 2 TTPs 12 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 1N24W4.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 2Z8801.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 3t97u.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 4B471I.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 128c38ec1c.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 5d8e367a3e.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine ed90cfbb12.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine c30b330d66.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine 237d8220b9.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Software\Wine skotes.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Windows security modification 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 4B471I.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 4B471I.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" y0m71.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ed90cfbb12.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1095381001\\ed90cfbb12.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\c30b330d66.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1095382001\\c30b330d66.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\128c38ec1c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1095383001\\128c38ec1c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\237d8220b9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1095384001\\237d8220b9.exe" skotes.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Z8l79.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of NtSetInformationThreadHideFromDebugger 12 IoCs
pid Process 5108 1N24W4.exe 1540 skotes.exe 5892 2Z8801.exe 4612 3t97u.exe 4320 4B471I.exe 3152 5d8e367a3e.exe 6032 ed90cfbb12.exe 2392 c30b330d66.exe 824 128c38ec1c.exe 1536 237d8220b9.exe 1084 skotes.exe 2032 skotes.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 824 set thread context of 2512 824 128c38ec1c.exe 106 PID 1536 set thread context of 2036 1536 237d8220b9.exe 107 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 1N24W4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2Z8801.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3t97u.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Z8l79.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language y0m71.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1N24W4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4B471I.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed90cfbb12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c30b330d66.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 237d8220b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5d8e367a3e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 128c38ec1c.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 5108 1N24W4.exe 5108 1N24W4.exe 1540 skotes.exe 1540 skotes.exe 5892 2Z8801.exe 5892 2Z8801.exe 4612 3t97u.exe 4612 3t97u.exe 4320 4B471I.exe 4320 4B471I.exe 4320 4B471I.exe 4320 4B471I.exe 3152 5d8e367a3e.exe 3152 5d8e367a3e.exe 6032 ed90cfbb12.exe 6032 ed90cfbb12.exe 6032 ed90cfbb12.exe 6032 ed90cfbb12.exe 6032 ed90cfbb12.exe 6032 ed90cfbb12.exe 2392 c30b330d66.exe 2392 c30b330d66.exe 824 128c38ec1c.exe 824 128c38ec1c.exe 1536 237d8220b9.exe 1536 237d8220b9.exe 1084 skotes.exe 1084 skotes.exe 2032 skotes.exe 2032 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4320 4B471I.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 5108 1N24W4.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 6020 wrote to memory of 1424 6020 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 85 PID 6020 wrote to memory of 1424 6020 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 85 PID 6020 wrote to memory of 1424 6020 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 85 PID 1424 wrote to memory of 3716 1424 Z8l79.exe 88 PID 1424 wrote to memory of 3716 1424 Z8l79.exe 88 PID 1424 wrote to memory of 3716 1424 Z8l79.exe 88 PID 3716 wrote to memory of 5108 3716 y0m71.exe 89 PID 3716 wrote to memory of 5108 3716 y0m71.exe 89 PID 3716 wrote to memory of 5108 3716 y0m71.exe 89 PID 5108 wrote to memory of 1540 5108 1N24W4.exe 91 PID 5108 wrote to memory of 1540 5108 1N24W4.exe 91 PID 5108 wrote to memory of 1540 5108 1N24W4.exe 91 PID 3716 wrote to memory of 5892 3716 y0m71.exe 92 PID 3716 wrote to memory of 5892 3716 y0m71.exe 92 PID 3716 wrote to memory of 5892 3716 y0m71.exe 92 PID 1424 wrote to memory of 4612 1424 Z8l79.exe 97 PID 1424 wrote to memory of 4612 1424 Z8l79.exe 97 PID 1424 wrote to memory of 4612 1424 Z8l79.exe 97 PID 6020 wrote to memory of 4320 6020 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 98 PID 6020 wrote to memory of 4320 6020 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 98 PID 6020 wrote to memory of 4320 6020 4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe 98 PID 1540 wrote to memory of 3152 1540 skotes.exe 100 PID 1540 wrote to memory of 3152 1540 skotes.exe 100 PID 1540 wrote to memory of 3152 1540 skotes.exe 100 PID 1540 wrote to memory of 6032 1540 skotes.exe 102 PID 1540 wrote to memory of 6032 1540 skotes.exe 102 PID 1540 wrote to memory of 6032 1540 skotes.exe 102 PID 1540 wrote to memory of 2392 1540 skotes.exe 103 PID 1540 wrote to memory of 2392 1540 skotes.exe 103 PID 1540 wrote to memory of 2392 1540 skotes.exe 103 PID 1540 wrote to memory of 824 1540 skotes.exe 104 PID 1540 wrote to memory of 824 1540 skotes.exe 104 PID 1540 wrote to memory of 824 1540 skotes.exe 104 PID 1540 wrote to memory of 1536 1540 skotes.exe 105 PID 1540 wrote to memory of 1536 1540 skotes.exe 105 PID 1540 wrote to memory of 1536 1540 skotes.exe 105 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 824 wrote to memory of 2512 824 128c38ec1c.exe 106 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107 PID 1536 wrote to memory of 2036 1536 237d8220b9.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe"C:\Users\Admin\AppData\Local\Temp\4a6b23ea581fcca7ccce7f3c7efbe836d6b27c570f76a4650e9021727f4ed8a9.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:6020 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8l79.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Z8l79.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0m71.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\y0m71.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N24W4.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\1N24W4.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"5⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Downloads MZ/PE file
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\1092840001\5d8e367a3e.exe"C:\Users\Admin\AppData\Local\Temp\1092840001\5d8e367a3e.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3152
-
-
C:\Users\Admin\AppData\Local\Temp\1095381001\ed90cfbb12.exe"C:\Users\Admin\AppData\Local\Temp\1095381001\ed90cfbb12.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:6032
-
-
C:\Users\Admin\AppData\Local\Temp\1095382001\c30b330d66.exe"C:\Users\Admin\AppData\Local\Temp\1095382001\c30b330d66.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\1095383001\128c38ec1c.exe"C:\Users\Admin\AppData\Local\Temp\1095383001\128c38ec1c.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\1095383001\128c38ec1c.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\1095384001\237d8220b9.exe"C:\Users\Admin\AppData\Local\Temp\1095384001\237d8220b9.exe"6⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\svchost015.exe"C:\Users\Admin\AppData\Local\Temp\1095384001\237d8220b9.exe"7⤵
- Downloads MZ/PE file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z8801.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\2Z8801.exe4⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5892
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t97u.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3t97u.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B471I.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4B471I.exe2⤵
- Modifies Windows Defender DisableAntiSpyware settings
- Modifies Windows Defender Real-time Protection settings
- Modifies Windows Defender TamperProtection settings
- Modifies Windows Defender notification settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1084
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2032
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
4Windows Service
4Defense Evasion
Impair Defenses
5Disable or Modify Tools
5Modify Registry
6Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5cfcd208495d565ef66e7dff9f98764da
SHA1b6589fc6ab0dc82cf12099d1c2d40ab994e8410c
SHA2565feceb66ffc86f38d952786c6d696c79c2dbc239dd4e91b46729d73a27fb57e9
SHA51231bca02094eb78126a517b206a88c73cfa9ec6f704c7030d18212cace820f025f00bf0ea68dbf3f3a5436ca63b53bf7bf80ad8d5de7d8359d0b7fed9dbc3ab99
-
Filesize
1.8MB
MD57c621a2e66f7f884bcfee6c7158e0137
SHA1bb3dc6fbdc34723e0866f2804156bb692f18648d
SHA256a31aecab064f200da6f0919df2b743c4480ace1f2d4d75f3212072d178325925
SHA512c628a6cb316d1f71e644f10bd30ae1419d7eceac2a9704b1d0672bb1c6602fe7fc6c622d73c7a6330195f9e84ffbfaebf15188451b2989ba4b4aa56c62d87471
-
Filesize
2.9MB
MD57d49c508d668584ae2c4c8e48d7c4778
SHA1c4e0f9513e9808321996ee3aeb6fc6606d19150b
SHA2561e3aec15db2c1f4385bae1d9599196cdd7419a4fd23a0c2920d6c9e4f16b7fd1
SHA51290015a6a457c8a38bd788c9c757380324df40903f1712fd2c12bf377a34f41f8493b33557ec7c752263c2139eea0cc78e026bbd5d6e18f1cfd73f0154526af14
-
Filesize
1.7MB
MD598b95f8f11752386203063c20b0e407e
SHA1be6c83d1e828fe22c31ec6d13e5848fc230104e7
SHA2566eb8c1366e41c42dc9bc540a8463aacda5809b2aa0a0ec68eb6a53e3bb55dd03
SHA512dc3c6ef151eff50734da8577600c9d178c10071bf6b94b91231254ec423784c9dc8b0a3c3c77c24c5a2079afd335d9ca595e8161a1310a0b5960cd548d165bd7
-
Filesize
4.5MB
MD52159a55003fbe0ce2d683c7478b9ff13
SHA187f91fc75c18d525b0150322a32023e666c340d1
SHA256bb84878684253df438ce6ca169c4ff97c7d8c4654f7ba3dc1496af05cc37aea0
SHA5122a792fb142f4e896dff937236b9fdb44e06b5f5637e71d3cfe44d594b725e00c14ed0d4511213ce722f051a24bc70e91dadb6f5fa2cbdef74e1df8b5d3d979ce
-
Filesize
3.0MB
MD5fc1e4df340c9005e05b8bfc96cec9e09
SHA1b443e9d3d0e35f97db505025d130ccb6646cd437
SHA2560c68affa8190af92aac6b35099f3e67659c42f6bc854a7d764a3a448eff2cb51
SHA5123a1cb04272ae35edbcae5211c02eca15735f63dfe0491158aee0565f226277810923b1f1cfca30dd594d926466628315454af466230f02d0b0f5d181fa3f2101
-
Filesize
2.7MB
MD52f65c9188c6ddfd96c196966c65e9aa7
SHA17ca6da9960fccd280fd036deeefa65b275b5f792
SHA256290b5a60c8fa715c5b46137fd5c99506276b6342fd42a27b5928fcc7bb29df9d
SHA51230feff5ff13740152ce57ceec5d2dc55438b54cd02c1e7643a8522f5d0c8a61df5dfe48908b1cd83bebfc533c277066bc1a9a7723f37aeb2a940fce0e325b6d2
-
Filesize
5.4MB
MD52024fb92bda6a08eea217ef06b2ebafb
SHA16859ae6b7d962b447a94ddeb5b0e9466d22f41d2
SHA256d012a77fe8284cc00f0834e27a9dba130f456cb4adbebfade357e0ab5f66dc5e
SHA5124fa2e75a848c053c734018e70ece6f4d6ac040e42316fe9fb577c1a872f14aa40487f5901e0417de2a9438b3c08d0c29331be65b2fe09bc11c15258905373480
-
Filesize
1.7MB
MD59afe225738179bdd84a982743ce6298a
SHA1df35f5add9f22f5a139dbb00f61c64109dcae505
SHA2569a24faceebda1a2dfa1fa5e1278e412ea83d3cb3b26f2f15088fba1dcc5f0c35
SHA51230ca1d5ec088c82e7e9117662f4259b6e7c1ace35c0bcdc455e91439a7474d8f1a6561f96f8fb147c7ef3c083fd955908bb79adc392715859127a2f25d5d2a35
-
Filesize
3.7MB
MD5589c2ca4c7780f81c0a9573b88c47d77
SHA1751aaf8018076025f4a8049ab107c265be870290
SHA25635f5a7c7bfd9027f61ed98fc9973e55213f1a6e9467c9cb13eb7e17d6c55b227
SHA512574f86597c72b9c5017a85be0470192b85d6ff052de05ec17a99a727ff006931a41276428d9196046b9cefe7976141a923a2b2dafb0187a6af953315515e2cf5
-
Filesize
1.8MB
MD5a1c953f923e4be116841c83804ac7291
SHA1788f595f67634c655126cfe557d6ac97910fdd3a
SHA256719a9b32734e31c4494274d6260673d297801e454b2c2817c09da21b635a30bd
SHA51265866df54204cf32448342dde8023020d74c76b3f59d76569b1736a814493a5640db26230a91474cdf83ed12bc935f522cf7943ff521906e123ea1cdb679b16d
-
Filesize
1.8MB
MD5c38e8b23e6d883cb93ae7a667e156593
SHA1be7454d7110cbcb6281396a912878eec8a3e4cad
SHA25691126811484fcbbc5b56d9e90b7663fa70439eb194a767ab66da76d22d976233
SHA51216449fd40c388bb2161b8ad3c68a6e02bdcaaedaed11cd0ec039776e2617d6ec8af8796c3904e194d58d92a203d46268d835e722a309e2d01e73925202452cd2
-
Filesize
2.9MB
MD5b826dd92d78ea2526e465a34324ebeea
SHA1bf8a0093acfd2eb93c102e1a5745fb080575372e
SHA2567824b50acdd144764dac7445a4067b35cf0fef619e451045ab6c1f54f5653a5b
SHA5121ac4b731b9b31cabf3b1c43aee37206aee5326c8e786abe2ab38e031633b778f97f2d6545cf745c3066f3bd47b7aaf2ded2f9955475428100eaf271dd9aeef17
-
Filesize
2KB
MD5e7d32e8f081a4c5fc8f8b696df8a83d3
SHA14fd9fb5567d22b2c2a6ed91ff2fdc661804d430e
SHA2562d4276cb13a7e7d4506f85dd32d7049a26b6d6fd020ec5516afec6ae8e8f859a
SHA5126b68e66e4b23d7aa200abbcc6c884ffa6e4b92d9f065210bbe874bf7d3a2191849b8422df8279516db7c322fbd3598964e40af86555d9c6dae75fb24418d0528