Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-11-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe
Resource
win7-20240903-en
General
-
Target
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe
-
Size
3.1MB
-
MD5
e35ed56f80a7af0634754dfecd4195ef
-
SHA1
f6fea977c73c0eb49527c92ee98bde249ec6fc93
-
SHA256
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c
-
SHA512
4a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431
-
SSDEEP
49152:7qBqsKm7aqtAChDwviQSLzaQvrVtzqy2S0tG8dBP4:7qkLmmq6ODwviQ2aQv5w93M2B
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection feb2eff7a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" feb2eff7a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" feb2eff7a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" feb2eff7a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" feb2eff7a2.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" feb2eff7a2.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 804367a26f.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0684ec069b.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ feb2eff7a2.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion feb2eff7a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 804367a26f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion feb2eff7a2.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 804367a26f.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0684ec069b.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0684ec069b.exe -
Executes dropped EXE 4 IoCs
pid Process 2732 skotes.exe 1868 804367a26f.exe 2488 0684ec069b.exe 1644 feb2eff7a2.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 0684ec069b.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine feb2eff7a2.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Wine 804367a26f.exe -
Loads dropped DLL 7 IoCs
pid Process 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe 2732 skotes.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" feb2eff7a2.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows Defender\Features feb2eff7a2.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\feb2eff7a2.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004349001\\feb2eff7a2.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\804367a26f.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004346001\\804367a26f.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\0684ec069b.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004347001\\0684ec069b.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 2732 skotes.exe 1868 804367a26f.exe 2488 0684ec069b.exe 1644 feb2eff7a2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 804367a26f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0684ec069b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language feb2eff7a2.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 2732 skotes.exe 1868 804367a26f.exe 2488 0684ec069b.exe 1644 feb2eff7a2.exe 1644 feb2eff7a2.exe 1644 feb2eff7a2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1644 feb2eff7a2.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1480 wrote to memory of 2732 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 30 PID 1480 wrote to memory of 2732 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 30 PID 1480 wrote to memory of 2732 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 30 PID 1480 wrote to memory of 2732 1480 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 30 PID 2732 wrote to memory of 1868 2732 skotes.exe 33 PID 2732 wrote to memory of 1868 2732 skotes.exe 33 PID 2732 wrote to memory of 1868 2732 skotes.exe 33 PID 2732 wrote to memory of 1868 2732 skotes.exe 33 PID 2732 wrote to memory of 2488 2732 skotes.exe 35 PID 2732 wrote to memory of 2488 2732 skotes.exe 35 PID 2732 wrote to memory of 2488 2732 skotes.exe 35 PID 2732 wrote to memory of 2488 2732 skotes.exe 35 PID 2732 wrote to memory of 1276 2732 skotes.exe 36 PID 2732 wrote to memory of 1276 2732 skotes.exe 36 PID 2732 wrote to memory of 1276 2732 skotes.exe 36 PID 2732 wrote to memory of 1276 2732 skotes.exe 36 PID 2732 wrote to memory of 1644 2732 skotes.exe 37 PID 2732 wrote to memory of 1644 2732 skotes.exe 37 PID 2732 wrote to memory of 1644 2732 skotes.exe 37 PID 2732 wrote to memory of 1644 2732 skotes.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe"C:\Users\Admin\AppData\Local\Temp\d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\1004346001\804367a26f.exe"C:\Users\Admin\AppData\Local\Temp\1004346001\804367a26f.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\1004347001\0684ec069b.exe"C:\Users\Admin\AppData\Local\Temp\1004347001\0684ec069b.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\1004349001\feb2eff7a2.exe"C:\Users\Admin\AppData\Local\Temp\1004349001\feb2eff7a2.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1644
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5762abdd13040ec18ebf9e5a1a4593fb1
SHA160424ca58558ef37124240f93dca495fe2c49717
SHA256902f89e5bfe3973df180c7641d7670641974241741ca7e179c5062b9c3e95fa1
SHA512fd1173823a37412d2220fad97819e5fbebfa0a8976fc935a97f823221cfcccb4899756fe70afaca0babf5df4cf97fc6979874df29af94ccec4bb7d710292f61d
-
Filesize
3.0MB
MD58c157c36b43d6fc91aa9a50e8bed1a9a
SHA1f89ef2c0b6851d2fc116e3ce6059d18061413f34
SHA256f2cc7f5340634bf3211e4edba67265d8ac19e91d6ba79b59c22e45b67d1faa78
SHA5120ec89d34759e8cd87dff843db51bc5f70efcb662d72be37f1063bb41d55bc4e53b0edab4c5303e55dbc63642130ef6da2ba18308ca8eeac129982632f85c5590
-
Filesize
2.0MB
MD5db72257c262a8b44297561583287ec24
SHA125edd82ec5bf0bc4ddf30106074d516375c32762
SHA256e0c73b5c64fc445ab6a459657497ba2842006d7d3ffbf5cd6895fc7347eef6c1
SHA512bfd2a9c4bb3752d8836030e7381c8fa529d0634409135eef69ec5a4e1492b21ba8928795c44421b41e5c3cf726736ad66806e15c8e217bb471ad015f5720ae13
-
Filesize
2.7MB
MD506981f0ca1102414be4420671c21194b
SHA11e2f952df57841ed17309f92296ef832016c69f1
SHA256c0df304a230358f05a4d405869b280876f9fdff619298d2407b431d75cbe1c73
SHA512f6f2722c6c93cac269c1b69fc2a6403e62b0318b99bfa083fb65cf98278300750b19ce3af30680b3fff00bd4dd7e1dfff57bcc94bb8b454be17a766a4c76fbbd
-
Filesize
3.1MB
MD5e35ed56f80a7af0634754dfecd4195ef
SHA1f6fea977c73c0eb49527c92ee98bde249ec6fc93
SHA256d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c
SHA5124a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431