Analysis
-
max time kernel
142s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe
Resource
win7-20240903-en
General
-
Target
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe
-
Size
3.1MB
-
MD5
e35ed56f80a7af0634754dfecd4195ef
-
SHA1
f6fea977c73c0eb49527c92ee98bde249ec6fc93
-
SHA256
d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c
-
SHA512
4a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431
-
SSDEEP
49152:7qBqsKm7aqtAChDwviQSLzaQvrVtzqy2S0tG8dBP4:7qkLmmq6ODwviQ2aQv5w93M2B
Malware Config
Extracted
amadey
4.42
9c9aa5
http://185.215.113.43
-
install_dir
abc3bc1985
-
install_file
skotes.exe
-
strings_key
8a35cf2ea38c2817dba29a4b5b25dcf0
-
url_paths
/Zu7JuNko/index.php
Extracted
stealc
tale
http://185.215.113.206
-
url_path
/6c4adf523b719729.php
Extracted
lumma
https://founpiuer.store/api
Signatures
-
Amadey family
-
Lumma family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" ab9ed2e43c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" ab9ed2e43c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" ab9ed2e43c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection ab9ed2e43c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" ab9ed2e43c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" ab9ed2e43c.exe -
Stealc family
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 8 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 0e0f5dbf99.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ 32f5871874.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ ab9ed2e43c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ skotes.exe -
Downloads MZ/PE file
-
Checks BIOS information in registry 2 TTPs 16 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 0e0f5dbf99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 0e0f5dbf99.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion ab9ed2e43c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion ab9ed2e43c.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion skotes.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 32f5871874.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 32f5871874.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation skotes.exe -
Executes dropped EXE 7 IoCs
pid Process 1012 skotes.exe 3524 skotes.exe 4676 0e0f5dbf99.exe 3700 32f5871874.exe 2328 ab9ed2e43c.exe 2468 skotes.exe 2688 skotes.exe -
Identifies Wine through registry keys 2 TTPs 8 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 0e0f5dbf99.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine 32f5871874.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine ab9ed2e43c.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe Key opened \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Wine skotes.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features ab9ed2e43c.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" ab9ed2e43c.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ab9ed2e43c.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004349001\\ab9ed2e43c.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\0e0f5dbf99.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004346001\\0e0f5dbf99.exe" skotes.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\32f5871874.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1004347001\\32f5871874.exe" skotes.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 8 IoCs
pid Process 3116 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 1012 skotes.exe 3524 skotes.exe 4676 0e0f5dbf99.exe 3700 32f5871874.exe 2328 ab9ed2e43c.exe 2468 skotes.exe 2688 skotes.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\Tasks\skotes.job d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2724 4676 WerFault.exe 94 4776 4676 WerFault.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skotes.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e0f5dbf99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32f5871874.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab9ed2e43c.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3116 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 3116 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 1012 skotes.exe 1012 skotes.exe 3524 skotes.exe 3524 skotes.exe 4676 0e0f5dbf99.exe 4676 0e0f5dbf99.exe 3700 32f5871874.exe 3700 32f5871874.exe 2328 ab9ed2e43c.exe 2328 ab9ed2e43c.exe 2328 ab9ed2e43c.exe 2328 ab9ed2e43c.exe 2468 skotes.exe 2468 skotes.exe 2688 skotes.exe 2688 skotes.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2328 ab9ed2e43c.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3116 wrote to memory of 1012 3116 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 87 PID 3116 wrote to memory of 1012 3116 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 87 PID 3116 wrote to memory of 1012 3116 d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe 87 PID 1012 wrote to memory of 4676 1012 skotes.exe 94 PID 1012 wrote to memory of 4676 1012 skotes.exe 94 PID 1012 wrote to memory of 4676 1012 skotes.exe 94 PID 1012 wrote to memory of 3700 1012 skotes.exe 102 PID 1012 wrote to memory of 3700 1012 skotes.exe 102 PID 1012 wrote to memory of 3700 1012 skotes.exe 102 PID 1012 wrote to memory of 4580 1012 skotes.exe 103 PID 1012 wrote to memory of 4580 1012 skotes.exe 103 PID 1012 wrote to memory of 4580 1012 skotes.exe 103 PID 1012 wrote to memory of 2328 1012 skotes.exe 104 PID 1012 wrote to memory of 2328 1012 skotes.exe 104 PID 1012 wrote to memory of 2328 1012 skotes.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe"C:\Users\Admin\AppData\Local\Temp\d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"2⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\1004346001\0e0f5dbf99.exe"C:\Users\Admin\AppData\Local\Temp\1004346001\0e0f5dbf99.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 15164⤵
- Program crash
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4676 -s 14964⤵
- Program crash
PID:4776
-
-
-
C:\Users\Admin\AppData\Local\Temp\1004347001\32f5871874.exe"C:\Users\Admin\AppData\Local\Temp\1004347001\32f5871874.exe"3⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3700
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe"3⤵PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\1004349001\ab9ed2e43c.exe"C:\Users\Admin\AppData\Local\Temp\1004349001\ab9ed2e43c.exe"3⤵
- Modifies Windows Defender Real-time Protection settings
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Windows security modification
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
-
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4676 -ip 46761⤵PID:1484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4676 -ip 46761⤵PID:224
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2468
-
C:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exeC:\Users\Admin\AppData\Local\Temp\abc3bc1985\skotes.exe1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2688
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
2Disable or Modify Tools
2Modify Registry
3Virtualization/Sandbox Evasion
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD594a80ede5ae67c8caebc5f43dc4644af
SHA1ae2f7635663cb05d83da9618284ca67c27be35b8
SHA256c1c0f96212ee13452aa7edb1561ca5b1f98bcf8c1c7c73eb3ca676d017a855c4
SHA51222cf07ae9c33108ad046d3ef99e340bbbf6e798b08aff66b7a019ef050943dbf04407bd1a86b8c033b39593584b83eac604e0f17365712732d72d85a9e393de6
-
Filesize
3.0MB
MD58c157c36b43d6fc91aa9a50e8bed1a9a
SHA1f89ef2c0b6851d2fc116e3ce6059d18061413f34
SHA256f2cc7f5340634bf3211e4edba67265d8ac19e91d6ba79b59c22e45b67d1faa78
SHA5120ec89d34759e8cd87dff843db51bc5f70efcb662d72be37f1063bb41d55bc4e53b0edab4c5303e55dbc63642130ef6da2ba18308ca8eeac129982632f85c5590
-
Filesize
2.0MB
MD5db72257c262a8b44297561583287ec24
SHA125edd82ec5bf0bc4ddf30106074d516375c32762
SHA256e0c73b5c64fc445ab6a459657497ba2842006d7d3ffbf5cd6895fc7347eef6c1
SHA512bfd2a9c4bb3752d8836030e7381c8fa529d0634409135eef69ec5a4e1492b21ba8928795c44421b41e5c3cf726736ad66806e15c8e217bb471ad015f5720ae13
-
Filesize
2.7MB
MD506981f0ca1102414be4420671c21194b
SHA11e2f952df57841ed17309f92296ef832016c69f1
SHA256c0df304a230358f05a4d405869b280876f9fdff619298d2407b431d75cbe1c73
SHA512f6f2722c6c93cac269c1b69fc2a6403e62b0318b99bfa083fb65cf98278300750b19ce3af30680b3fff00bd4dd7e1dfff57bcc94bb8b454be17a766a4c76fbbd
-
Filesize
3.1MB
MD5e35ed56f80a7af0634754dfecd4195ef
SHA1f6fea977c73c0eb49527c92ee98bde249ec6fc93
SHA256d3a80f61dbaca8dcea50c0c87bf8bc39ab4d725ed2587206bfa7e62de7278c9c
SHA5124a8296090a6d392512f60c26b9c0209079af8cd02daf951e7a079eb13eb687dbcf40b2a936564cb6ba999f5f959e174c756c120f1e172b7d59a517186f7db431