Analysis
-
max time kernel
142s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 09:21
Static task
static1
Behavioral task
behavioral1
Sample
def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe
Resource
win7-20240903-en
General
-
Target
def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe
-
Size
3.1MB
-
MD5
80780678447355a2bc3157723d80033b
-
SHA1
3ca0030f2582c21959f2b5d25cf57a926a4314a1
-
SHA256
def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361
-
SHA512
90fade4ec430ffd1f165d6cbef9ae8d4d9f93f17200c0907f85e5c653484d72e0c7471a32bd42544dff4350e96a4c16521c87e5779b8b068f9f8c85a662ee546
-
SSDEEP
49152:tRCiNmW7ggey/6JYzvfqTkGkJHi9Eu+0yp++IhT/W/oa/EiS:6sj9eM6JYzvfYkGkJC2u+08++IaDEi
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 26d47cbe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 26d47cbe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 26d47cbe01.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 26d47cbe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 26d47cbe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 26d47cbe01.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 26d47cbe01.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 41ee7b7106.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 60f0fff35b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 26d47cbe01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 60f0fff35b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 26d47cbe01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 41ee7b7106.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 41ee7b7106.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 60f0fff35b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 4272 skotes.exe 1400 41ee7b7106.exe 856 60f0fff35b.exe 3796 skotes.exe 2688 26d47cbe01.exe 1576 skotes.exe 4136 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 26d47cbe01.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 41ee7b7106.exe Key opened \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Software\Wine 60f0fff35b.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 26d47cbe01.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 26d47cbe01.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\41ee7b7106.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004321001\\41ee7b7106.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\60f0fff35b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004322001\\60f0fff35b.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\26d47cbe01.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004324001\\26d47cbe01.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe 4272 skotes.exe 1400 41ee7b7106.exe 856 60f0fff35b.exe 3796 skotes.exe 2688 26d47cbe01.exe 1576 skotes.exe 4136 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2972 1400 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 60f0fff35b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 26d47cbe01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 41ee7b7106.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe 4272 skotes.exe 4272 skotes.exe 1400 41ee7b7106.exe 1400 41ee7b7106.exe 856 60f0fff35b.exe 856 60f0fff35b.exe 3796 skotes.exe 3796 skotes.exe 2688 26d47cbe01.exe 2688 26d47cbe01.exe 2688 26d47cbe01.exe 2688 26d47cbe01.exe 2688 26d47cbe01.exe 1576 skotes.exe 1576 skotes.exe 4136 skotes.exe 4136 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 26d47cbe01.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1128 wrote to memory of 4272 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe 87 PID 1128 wrote to memory of 4272 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe 87 PID 1128 wrote to memory of 4272 1128 def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe 87 PID 4272 wrote to memory of 1400 4272 skotes.exe 92 PID 4272 wrote to memory of 1400 4272 skotes.exe 92 PID 4272 wrote to memory of 1400 4272 skotes.exe 92 PID 4272 wrote to memory of 856 4272 skotes.exe 100 PID 4272 wrote to memory of 856 4272 skotes.exe 100 PID 4272 wrote to memory of 856 4272 skotes.exe 100 PID 4272 wrote to memory of 1212 4272 skotes.exe 105 PID 4272 wrote to memory of 1212 4272 skotes.exe 105 PID 4272 wrote to memory of 1212 4272 skotes.exe 105 PID 4272 wrote to memory of 2688 4272 skotes.exe 107 PID 4272 wrote to memory of 2688 4272 skotes.exe 107 PID 4272 wrote to memory of 2688 4272 skotes.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe"C:\Users\Admin\AppData\Local\Temp\def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\1004321001\41ee7b7106.exe"C:\Users\Admin\AppData\Local\Temp\1004321001\41ee7b7106.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 14804⤵
- Program crash
PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004322001\60f0fff35b.exe"C:\Users\Admin\AppData\Local\Temp\1004322001\60f0fff35b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\1004324001\26d47cbe01.exe"C:\Users\Admin\AppData\Local\Temp\1004324001\26d47cbe01.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1400 -ip 14001⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3796
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1400 -ip 14001⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1576
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4136
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD5d76cb29d3e2e46571502ac53cce294fd
SHA1892254128a918ef30a0619b1ad57d13d9833431b
SHA256a277eaaf64425b7183487a5ffbfa828ff67cc2c499c51a94fb87d438ca8015be
SHA512976d55930ab19f3dbb971cb50c66523843c160ddb0d80baac2f1d05510b61fdae77475fc2a2cd438cfb1678720e3340ca3dee9a9131c9942f99d04ee7103727c
-
Filesize
2.1MB
MD57a6fb3221e1a7c6c17fdfedfe627a427
SHA13761f898656c79d8564248c9817400e5f8080b09
SHA256a63fcb0e8ed99f42ff8269e524321434af557140d82fc02e1a444316e7231aa5
SHA51269760b7878f6877c12779a479ec3c9bfb63dc3f3d631727d8a5820fe2d701e6af533426b8f8a4aaf0d127be27a34d4444c034f21bf3cf236ffae81f67a4d9d1c
-
Filesize
2.7MB
MD5e61f71ea2723ee4f31906f3628d3e380
SHA178111d2404a0dd86291203e80648d454d63789f5
SHA2567ee4e5f1ced524a4907c22207ce79668112eae18ee32d5111ef0b7c35ccec49d
SHA5129c23f37efb00aef228988dc582814dfa6f525de78f9a0e1890ab59e140de8ad6a38c20b2a27a342cf27dcdb6e3a7a6c2983b2cdd4b41738c8d65d6a958cdda33
-
Filesize
3.1MB
MD580780678447355a2bc3157723d80033b
SHA13ca0030f2582c21959f2b5d25cf57a926a4314a1
SHA256def526b2c332d0019092a86b5686c4ed246779cd8e3235aef94c4901dfc7d361
SHA51290fade4ec430ffd1f165d6cbef9ae8d4d9f93f17200c0907f85e5c653484d72e0c7471a32bd42544dff4350e96a4c16521c87e5779b8b068f9f8c85a662ee546