Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:00
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20241010-en
General
-
Target
file.exe
-
Size
3.1MB
-
MD5
bcbe71a530c6211a1bd93c7b3226876c
-
SHA1
cfe3d8fd44282ccdd7c67d96c03380df4013a49d
-
SHA256
44468177822195c3b86c797d050d3752a158218f91f236a8ee8ed027a48ad236
-
SHA512
bd0f421538e71443b4d0165ab432d7056114dcfdb61aea9b2ee191910a88ed7e22adaf54e748814cdd5604c5dcf59e70bd849beace2b913488cf5aa95e48e537
-
SSDEEP
49152:9T+Vp5sijVLio12jGnbXS2sEbFMtz76vxvSi5HIV+:B+Vp+ijVLioSGnbiJEbszShSi5oV+
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection dbc325b300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" dbc325b300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" dbc325b300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" dbc325b300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" dbc325b300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" dbc325b300.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 7 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ file.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2fb2074de9.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 15deabba1f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ dbc325b300.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 14 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2fb2074de9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 15deabba1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 15deabba1f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dbc325b300.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion file.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2fb2074de9.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion dbc325b300.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation skotes.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 6 IoCs
pid Process 4612 skotes.exe 1348 2fb2074de9.exe 2016 15deabba1f.exe 3656 dbc325b300.exe 4472 skotes.exe 5064 skotes.exe -
Identifies Wine through registry keys 2 TTPs 7 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine dbc325b300.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine file.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 2fb2074de9.exe Key opened \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Software\Wine 15deabba1f.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features dbc325b300.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" dbc325b300.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2fb2074de9.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004340001\\2fb2074de9.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\15deabba1f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004341001\\15deabba1f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\dbc325b300.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004343001\\dbc325b300.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 3260 file.exe 4612 skotes.exe 1348 2fb2074de9.exe 2016 15deabba1f.exe 3656 dbc325b300.exe 4472 skotes.exe 5064 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1728 1348 WerFault.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2fb2074de9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15deabba1f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbc325b300.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3260 file.exe 3260 file.exe 4612 skotes.exe 4612 skotes.exe 1348 2fb2074de9.exe 1348 2fb2074de9.exe 2016 15deabba1f.exe 2016 15deabba1f.exe 3656 dbc325b300.exe 3656 dbc325b300.exe 3656 dbc325b300.exe 3656 dbc325b300.exe 4472 skotes.exe 4472 skotes.exe 5064 skotes.exe 5064 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3656 dbc325b300.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3260 file.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3260 wrote to memory of 4612 3260 file.exe 87 PID 3260 wrote to memory of 4612 3260 file.exe 87 PID 3260 wrote to memory of 4612 3260 file.exe 87 PID 4612 wrote to memory of 1348 4612 skotes.exe 96 PID 4612 wrote to memory of 1348 4612 skotes.exe 96 PID 4612 wrote to memory of 1348 4612 skotes.exe 96 PID 4612 wrote to memory of 2016 4612 skotes.exe 105 PID 4612 wrote to memory of 2016 4612 skotes.exe 105 PID 4612 wrote to memory of 2016 4612 skotes.exe 105 PID 4612 wrote to memory of 4360 4612 skotes.exe 106 PID 4612 wrote to memory of 4360 4612 skotes.exe 106 PID 4612 wrote to memory of 4360 4612 skotes.exe 106 PID 4612 wrote to memory of 3656 4612 skotes.exe 107 PID 4612 wrote to memory of 3656 4612 skotes.exe 107 PID 4612 wrote to memory of 3656 4612 skotes.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\1004340001\2fb2074de9.exe"C:\Users\Admin\AppData\Local\Temp\1004340001\2fb2074de9.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1348 -s 14684⤵
- Program crash
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004341001\15deabba1f.exe"C:\Users\Admin\AppData\Local\Temp\1004341001\15deabba1f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:4360
-
-
C:\Users\Admin\AppData\Local\Temp\1004343001\dbc325b300.exe"C:\Users\Admin\AppData\Local\Temp\1004343001\dbc325b300.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1348 -ip 13481⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:4472
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:5064
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5b6f3d0ba2f4177d0e51286f9a228db14
SHA1e129937e651337736cb0560bd5f88f46fa29454f
SHA2565a91702c563928e514e03bf705f2a4fcc1bf4e77ce80bab78647def1ff2aa669
SHA5129f619cfc2c30e5e763785eca88ca0b4824a50c0b3c86b4ebace624c04e5b4f09f879df3078087f062710bcd17a000004f65498c33252092cd4c675e23da4e1a9
-
Filesize
3.0MB
MD58c157c36b43d6fc91aa9a50e8bed1a9a
SHA1f89ef2c0b6851d2fc116e3ce6059d18061413f34
SHA256f2cc7f5340634bf3211e4edba67265d8ac19e91d6ba79b59c22e45b67d1faa78
SHA5120ec89d34759e8cd87dff843db51bc5f70efcb662d72be37f1063bb41d55bc4e53b0edab4c5303e55dbc63642130ef6da2ba18308ca8eeac129982632f85c5590
-
Filesize
2.0MB
MD5db72257c262a8b44297561583287ec24
SHA125edd82ec5bf0bc4ddf30106074d516375c32762
SHA256e0c73b5c64fc445ab6a459657497ba2842006d7d3ffbf5cd6895fc7347eef6c1
SHA512bfd2a9c4bb3752d8836030e7381c8fa529d0634409135eef69ec5a4e1492b21ba8928795c44421b41e5c3cf726736ad66806e15c8e217bb471ad015f5720ae13
-
Filesize
2.7MB
MD506981f0ca1102414be4420671c21194b
SHA11e2f952df57841ed17309f92296ef832016c69f1
SHA256c0df304a230358f05a4d405869b280876f9fdff619298d2407b431d75cbe1c73
SHA512f6f2722c6c93cac269c1b69fc2a6403e62b0318b99bfa083fb65cf98278300750b19ce3af30680b3fff00bd4dd7e1dfff57bcc94bb8b454be17a766a4c76fbbd
-
Filesize
3.1MB
MD5bcbe71a530c6211a1bd93c7b3226876c
SHA1cfe3d8fd44282ccdd7c67d96c03380df4013a49d
SHA25644468177822195c3b86c797d050d3752a158218f91f236a8ee8ed027a48ad236
SHA512bd0f421538e71443b4d0165ab432d7056114dcfdb61aea9b2ee191910a88ed7e22adaf54e748814cdd5604c5dcf59e70bd849beace2b913488cf5aa95e48e537