Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:11
Static task
static1
Behavioral task
behavioral1
Sample
68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe
Resource
win7-20240903-en
General
-
Target
68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe
-
Size
3.1MB
-
MD5
b733439c4301274dc53cd695ee993ea0
-
SHA1
14aad203f90d43e7778031f13c7211159fb2ea61
-
SHA256
68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f
-
SHA512
47fb65bae81a6f63069fde903e3fd11624d7f7e68548ebc8991e7a77bb5d285424b623d8cf9d8a1988f196a7159738b709c507628860e8335633965e63ce75da
-
SSDEEP
49152:2eCJEsf1dvcE7LjiJE1sA7whzCYW9P8Vc81EY7x:2e0f1hcEHjiJE1s26CYIEL7x
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 2235799685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 2235799685.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 2235799685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 2235799685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 2235799685.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 2235799685.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ff0d39a63b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 2235799685.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ded8225290.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ded8225290.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ff0d39a63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2235799685.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 2235799685.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ded8225290.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ff0d39a63b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 4136 skotes.exe 1892 ded8225290.exe 2932 skotes.exe 1436 ff0d39a63b.exe 4016 2235799685.exe 392 skotes.exe 3524 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ded8225290.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine ff0d39a63b.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine 2235799685.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Software\Wine skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 2235799685.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 2235799685.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\2235799685.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004349001\\2235799685.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ded8225290.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004346001\\ded8225290.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ff0d39a63b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004347001\\ff0d39a63b.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe 4136 skotes.exe 1892 ded8225290.exe 2932 skotes.exe 1436 ff0d39a63b.exe 4016 2235799685.exe 392 skotes.exe 3524 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3520 1892 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ded8225290.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ff0d39a63b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2235799685.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe 4136 skotes.exe 4136 skotes.exe 1892 ded8225290.exe 1892 ded8225290.exe 2932 skotes.exe 2932 skotes.exe 1436 ff0d39a63b.exe 1436 ff0d39a63b.exe 4016 2235799685.exe 4016 2235799685.exe 4016 2235799685.exe 4016 2235799685.exe 392 skotes.exe 392 skotes.exe 3524 skotes.exe 3524 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4016 2235799685.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1408 wrote to memory of 4136 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe 87 PID 1408 wrote to memory of 4136 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe 87 PID 1408 wrote to memory of 4136 1408 68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe 87 PID 4136 wrote to memory of 1892 4136 skotes.exe 92 PID 4136 wrote to memory of 1892 4136 skotes.exe 92 PID 4136 wrote to memory of 1892 4136 skotes.exe 92 PID 4136 wrote to memory of 1436 4136 skotes.exe 100 PID 4136 wrote to memory of 1436 4136 skotes.exe 100 PID 4136 wrote to memory of 1436 4136 skotes.exe 100 PID 4136 wrote to memory of 1648 4136 skotes.exe 101 PID 4136 wrote to memory of 1648 4136 skotes.exe 101 PID 4136 wrote to memory of 1648 4136 skotes.exe 101 PID 4136 wrote to memory of 4016 4136 skotes.exe 102 PID 4136 wrote to memory of 4016 4136 skotes.exe 102 PID 4136 wrote to memory of 4016 4136 skotes.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe"C:\Users\Admin\AppData\Local\Temp\68eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\1004346001\ded8225290.exe"C:\Users\Admin\AppData\Local\Temp\1004346001\ded8225290.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1892 -s 14604⤵
- Program crash
PID:3520
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004347001\ff0d39a63b.exe"C:\Users\Admin\AppData\Local\Temp\1004347001\ff0d39a63b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:1648
-
-
C:\Users\Admin\AppData\Local\Temp\1004349001\2235799685.exe"C:\Users\Admin\AppData\Local\Temp\1004349001\2235799685.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1892 -ip 18921⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2932
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:392
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3524
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5346ca5d7406f99ace5d901270a6b3adc
SHA11a28506524201cd91e320aa8840d0db09e0aee95
SHA256ce85f4e0972ebe5ce3d26f1c8b25ed78e8fc12e0e0dbc8d341dc3d93f0f98f1b
SHA512708e48298a56ef10f67b1ed13892cf32959d9aa6ea5a3a87ca7c7aa743a8c22b6127cdf86a9bc5c5a9af7719ffc20b85076f78f4dcfa22b4a5bc0feafb788fd3
-
Filesize
3.0MB
MD58c157c36b43d6fc91aa9a50e8bed1a9a
SHA1f89ef2c0b6851d2fc116e3ce6059d18061413f34
SHA256f2cc7f5340634bf3211e4edba67265d8ac19e91d6ba79b59c22e45b67d1faa78
SHA5120ec89d34759e8cd87dff843db51bc5f70efcb662d72be37f1063bb41d55bc4e53b0edab4c5303e55dbc63642130ef6da2ba18308ca8eeac129982632f85c5590
-
Filesize
2.0MB
MD5db72257c262a8b44297561583287ec24
SHA125edd82ec5bf0bc4ddf30106074d516375c32762
SHA256e0c73b5c64fc445ab6a459657497ba2842006d7d3ffbf5cd6895fc7347eef6c1
SHA512bfd2a9c4bb3752d8836030e7381c8fa529d0634409135eef69ec5a4e1492b21ba8928795c44421b41e5c3cf726736ad66806e15c8e217bb471ad015f5720ae13
-
Filesize
2.7MB
MD506981f0ca1102414be4420671c21194b
SHA11e2f952df57841ed17309f92296ef832016c69f1
SHA256c0df304a230358f05a4d405869b280876f9fdff619298d2407b431d75cbe1c73
SHA512f6f2722c6c93cac269c1b69fc2a6403e62b0318b99bfa083fb65cf98278300750b19ce3af30680b3fff00bd4dd7e1dfff57bcc94bb8b454be17a766a4c76fbbd
-
Filesize
3.1MB
MD5b733439c4301274dc53cd695ee993ea0
SHA114aad203f90d43e7778031f13c7211159fb2ea61
SHA25668eb987a62b6945287f28f021980b468df4622115fb643a14b43dd5f87b60b0f
SHA51247fb65bae81a6f63069fde903e3fd11624d7f7e68548ebc8991e7a77bb5d285424b623d8cf9d8a1988f196a7159738b709c507628860e8335633965e63ce75da