Analysis
-
max time kernel
144s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 10:30
Static task
static1
Behavioral task
behavioral1
Sample
ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe
Resource
win7-20240903-en
General
-
Target
ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe
-
Size
3.0MB
-
MD5
0f7da6c048e4dbc41255caf9bc9556a0
-
SHA1
7e006997fd3589179e09edb031d99bcbf0c1059d
-
SHA256
ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe
-
SHA512
51cba49a7325ff22dbc89cd478e1397d7abeab7667df514a89a857c3a12716b0227dbfb3c05ddc98f991aa4946efe6da9172fa4c22e920e27b9791eee2914d6c
-
SSDEEP
49152:iToZmGOUyrXblt4wYEOZQnaKaSIR66eN/ql/:iTvvrXbltRNgQnaKt98
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" e629e58cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" e629e58cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" e629e58cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" e629e58cca.exe Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection e629e58cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" e629e58cca.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a73841f3a1.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 69787fbc9d.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 29e077f0bd.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ e629e58cca.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ a921175266.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a921175266.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a73841f3a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion a73841f3a1.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 69787fbc9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 29e077f0bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion e629e58cca.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion a921175266.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 69787fbc9d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 29e077f0bd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion e629e58cca.exe -
Executes dropped EXE 7 IoCs
pid Process 2408 skotes.exe 2336 69787fbc9d.exe 1312 29e077f0bd.exe 1532 skotes.exe 2764 e629e58cca.exe 2724 a921175266.exe 1704 a73841f3a1.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 29e077f0bd.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine e629e58cca.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine a921175266.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine a73841f3a1.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Wine 69787fbc9d.exe -
Loads dropped DLL 11 IoCs
pid Process 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe 2408 skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features e629e58cca.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" e629e58cca.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\69787fbc9d.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004334001\\69787fbc9d.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\29e077f0bd.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004335001\\29e077f0bd.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\e629e58cca.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004337001\\e629e58cca.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 2408 skotes.exe 2336 69787fbc9d.exe 1312 29e077f0bd.exe 1532 skotes.exe 2764 e629e58cca.exe 2724 a921175266.exe 1704 a73841f3a1.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2408 set thread context of 1532 2408 skotes.exe 35 -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a73841f3a1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69787fbc9d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29e077f0bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e629e58cca.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a921175266.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 2408 skotes.exe 2336 69787fbc9d.exe 1312 29e077f0bd.exe 1532 skotes.exe 2764 e629e58cca.exe 2724 a921175266.exe 2764 e629e58cca.exe 2764 e629e58cca.exe 1704 a73841f3a1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2764 e629e58cca.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2908 wrote to memory of 2408 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 28 PID 2908 wrote to memory of 2408 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 28 PID 2908 wrote to memory of 2408 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 28 PID 2908 wrote to memory of 2408 2908 ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe 28 PID 2408 wrote to memory of 2336 2408 skotes.exe 32 PID 2408 wrote to memory of 2336 2408 skotes.exe 32 PID 2408 wrote to memory of 2336 2408 skotes.exe 32 PID 2408 wrote to memory of 2336 2408 skotes.exe 32 PID 2408 wrote to memory of 1312 2408 skotes.exe 34 PID 2408 wrote to memory of 1312 2408 skotes.exe 34 PID 2408 wrote to memory of 1312 2408 skotes.exe 34 PID 2408 wrote to memory of 1312 2408 skotes.exe 34 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 1532 2408 skotes.exe 35 PID 2408 wrote to memory of 2764 2408 skotes.exe 36 PID 2408 wrote to memory of 2764 2408 skotes.exe 36 PID 2408 wrote to memory of 2764 2408 skotes.exe 36 PID 2408 wrote to memory of 2764 2408 skotes.exe 36 PID 2408 wrote to memory of 2724 2408 skotes.exe 37 PID 2408 wrote to memory of 2724 2408 skotes.exe 37 PID 2408 wrote to memory of 2724 2408 skotes.exe 37 PID 2408 wrote to memory of 2724 2408 skotes.exe 37 PID 2408 wrote to memory of 1704 2408 skotes.exe 38 PID 2408 wrote to memory of 1704 2408 skotes.exe 38 PID 2408 wrote to memory of 1704 2408 skotes.exe 38 PID 2408 wrote to memory of 1704 2408 skotes.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe"C:\Users\Admin\AppData\Local\Temp\ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\1004334001\69787fbc9d.exe"C:\Users\Admin\AppData\Local\Temp\1004334001\69787fbc9d.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\1004335001\29e077f0bd.exe"C:\Users\Admin\AppData\Local\Temp\1004335001\29e077f0bd.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1312
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Users\Admin\AppData\Local\Temp\1004337001\e629e58cca.exe"C:\Users\Admin\AppData\Local\Temp\1004337001\e629e58cca.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\1004338001\a921175266.exe"C:\Users\Admin\AppData\Local\Temp\1004338001\a921175266.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\1004339001\a73841f3a1.exe"C:\Users\Admin\AppData\Local\Temp\1004339001\a73841f3a1.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5193cc84adcf4c3a129f996265869caba
SHA15d6dae6cc8fc0bc1ca121a07410bc92e7f6d1a26
SHA256de4e2fd6eef379c8d15a245c508013092e6ddbcc1722f3f3e7862de0d2b36e01
SHA51200b371d157888e84efedb94ac2ee945506f1e7964d29a6e68ea5dbad85ae1d4143c18cbc2c5512a7b06aa68235337598d1101acb11d990a48ae578bd07d249ed
-
Filesize
3.0MB
MD58c157c36b43d6fc91aa9a50e8bed1a9a
SHA1f89ef2c0b6851d2fc116e3ce6059d18061413f34
SHA256f2cc7f5340634bf3211e4edba67265d8ac19e91d6ba79b59c22e45b67d1faa78
SHA5120ec89d34759e8cd87dff843db51bc5f70efcb662d72be37f1063bb41d55bc4e53b0edab4c5303e55dbc63642130ef6da2ba18308ca8eeac129982632f85c5590
-
Filesize
2.0MB
MD5db72257c262a8b44297561583287ec24
SHA125edd82ec5bf0bc4ddf30106074d516375c32762
SHA256e0c73b5c64fc445ab6a459657497ba2842006d7d3ffbf5cd6895fc7347eef6c1
SHA512bfd2a9c4bb3752d8836030e7381c8fa529d0634409135eef69ec5a4e1492b21ba8928795c44421b41e5c3cf726736ad66806e15c8e217bb471ad015f5720ae13
-
Filesize
2.7MB
MD506981f0ca1102414be4420671c21194b
SHA11e2f952df57841ed17309f92296ef832016c69f1
SHA256c0df304a230358f05a4d405869b280876f9fdff619298d2407b431d75cbe1c73
SHA512f6f2722c6c93cac269c1b69fc2a6403e62b0318b99bfa083fb65cf98278300750b19ce3af30680b3fff00bd4dd7e1dfff57bcc94bb8b454be17a766a4c76fbbd
-
Filesize
3.0MB
MD50f7da6c048e4dbc41255caf9bc9556a0
SHA17e006997fd3589179e09edb031d99bcbf0c1059d
SHA256ffc2b8887d1b24795f31c712bb1392822abeb13f20cc3595f73cbf14c6190dfe
SHA51251cba49a7325ff22dbc89cd478e1397d7abeab7667df514a89a857c3a12716b0227dbfb3c05ddc98f991aa4946efe6da9172fa4c22e920e27b9791eee2914d6c