Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-11-2024 03:30
Static task
static1
General
-
Target
7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe
-
Size
5.6MB
-
MD5
56dae66fe9e918710134238e6ad5baa3
-
SHA1
fa75388aff74f2f4abe1ee726c93d3d2822b9a68
-
SHA256
7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2
-
SHA512
ef89d142abe55bd2d6e0c238f0a5f3c7b57b0e43377a75d44ba4172d7183c4c13dfcdafec031d00c35b55665048eb15e43581c5d1e07d525ea2b944b08dff39a
-
SSDEEP
98304:5ZMw7Ejk+oFsVrNcHSSrkTDOJ7qCL5XBpW+6dTUy/sl:5ZMw7EjkQVroBkTDOV9PpW++TUt
Malware Config
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2a5131.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 3F17R.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 4K023H.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Checks BIOS information in registry 2 TTPs 12 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3F17R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3F17R.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2a5131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2a5131.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 4K023H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 4K023H.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 4K023H.exe -
Executes dropped EXE 7 IoCs
pid Process 3252 l2A58.exe 2040 2a5131.exe 4416 3F17R.exe 3504 4K023H.exe 2828 skotes.exe 4760 skotes.exe 3096 skotes.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 2a5131.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 3F17R.exe Key opened \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Wine 4K023H.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" l2A58.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2040 2a5131.exe 4416 3F17R.exe 3504 4K023H.exe 2828 skotes.exe 4760 skotes.exe 3096 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 4K023H.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3772 2040 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language l2A58.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a5131.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3F17R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4K023H.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 2040 2a5131.exe 2040 2a5131.exe 4416 3F17R.exe 4416 3F17R.exe 3504 4K023H.exe 3504 4K023H.exe 2828 skotes.exe 2828 skotes.exe 4760 skotes.exe 4760 skotes.exe 3096 skotes.exe 3096 skotes.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3504 4K023H.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4452 wrote to memory of 3252 4452 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 84 PID 4452 wrote to memory of 3252 4452 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 84 PID 4452 wrote to memory of 3252 4452 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 84 PID 3252 wrote to memory of 2040 3252 l2A58.exe 85 PID 3252 wrote to memory of 2040 3252 l2A58.exe 85 PID 3252 wrote to memory of 2040 3252 l2A58.exe 85 PID 3252 wrote to memory of 4416 3252 l2A58.exe 97 PID 3252 wrote to memory of 4416 3252 l2A58.exe 97 PID 3252 wrote to memory of 4416 3252 l2A58.exe 97 PID 4452 wrote to memory of 3504 4452 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 100 PID 4452 wrote to memory of 3504 4452 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 100 PID 4452 wrote to memory of 3504 4452 7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe 100 PID 3504 wrote to memory of 2828 3504 4K023H.exe 101 PID 3504 wrote to memory of 2828 3504 4K023H.exe 101 PID 3504 wrote to memory of 2828 3504 4K023H.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe"C:\Users\Admin\AppData\Local\Temp\7a8091adae649be1b60dffc3835d7ca8b068f78925aa22e4fbb610ac261da3c2.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2A58.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\l2A58.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2a5131.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\2a5131.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2040 -s 16004⤵
- Program crash
PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F17R.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\3F17R.exe3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4K023H.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4K023H.exe2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2040 -ip 20401⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4760
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3096
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.1MB
MD536cde0f98ab8a93df2c3134ab9771502
SHA1d778b355d36d12d05562bed3f78af22c944eb575
SHA2566d466d1d251413c12eea858fb6632f05321720d64212b98b92b68a7190627261
SHA512a79ef6f322657769550e03f1734b88c1a3b330ec6523f5fa444066cea7bc1dfd2df41833d9c99380209f2e25d1685c81dbc9eee948aa30678ff8a54a3b4c5d80
-
Filesize
3.8MB
MD5ba8e83413484b0fc931cd1265751af3f
SHA1b8000dfddf6ee7fc176ea4d8e60515885e5cf0c5
SHA256dace49f1e6a37e4910314a5674abc7e46cd08d20ca92d423f540466a94320479
SHA512ff0748f76ce627406627ae8338f2c5c6dea1e8bafe06c32791ca8684cecb454825c623610b93e39cd40db7b33c735fc37f2c9b0987d46bde47fa73507a017378
-
Filesize
2.9MB
MD5d4d8406aa8da86e06a9fe0942d4e7eb8
SHA1c2d2503604f1af2cc099af2021bb544b0a563c20
SHA25657a15eecd54ed9592c6d49f6b5a562ed44c049f1265ecf7b42a90569dc8f8740
SHA51278f7dac660bd11af6ac985d4f00397258b05c083479677797b7e23a5675b33ed3a2b09f2801166a34a15480734554277133a5dbe030edab4b081df51e8e47e7e
-
Filesize
2.1MB
MD5bbcc32dc6b38c304fd1e85e156e19753
SHA1b1afa09577e219950778ee0336ecc59ea9d19f04
SHA2569424a09ca4319cd342a64203eda4b47c4e48b96c5194e90c55e40f34c2601387
SHA5128f2a5aa684f6876d97e0f6ac4ac378429af0b09a1b956a42444eed9b54629469acdc7ef6a97aab3f75d4bdc0dd47c4d21dd3166562af15e0a49beede5346ca7d